| 000 -LEADER |
| fixed length control field |
03072cam a22004817a 4500 |
| 001 - CONTROL NUMBER |
| control field |
7867707 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20210827105218.0 |
| 006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS |
| fixed length control field |
m d |
| 007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
| fixed length control field |
cr n |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
090126s2010 nyua sb 001 0 eng d |
| 015 ## - NATIONAL BIBLIOGRAPHY NUMBER |
| National bibliography number |
GBA8C6117 |
| Source |
bnb |
| 015 ## - NATIONAL BIBLIOGRAPHY NUMBER |
| National bibliography number |
990523004 |
| Source |
dnb |
| 016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER |
| Record control number |
014794000 |
| Source |
Uk |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9780387887708 (alk. paper) |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(WaSeSS)ssj0000325088 |
| 038 ## - RECORD CONTENT LICENSOR |
| Staff Name |
khadija |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
UKM |
| Transcribing agency |
UKM |
| Modifying agency |
CDX |
| -- |
YDXCP |
| -- |
GBVCP |
| -- |
VCV |
| -- |
CTB |
| -- |
WAU |
| -- |
LHU |
| -- |
NJI |
| -- |
DLC |
| -- |
WaSeSS |
| 042 ## - AUTHENTICATION CODE |
| Authentication code |
ukblcatcopy |
| -- |
lccopycat |
| 050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
TK5105.59 |
| Item number |
.G63 2010 |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Edition number |
23 |
| Author Mark |
GHO |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Ghorbani, A. Ali |
| Dates associated with a name |
1954- |
| 9 (RLIN) |
81727 |
| 210 10 - ABBREVIATED TITLE |
| Abbreviated title |
Network intrusion detection and prevention |
| 245 10 - TITLE STATEMENT |
| Title |
Network intrusion detection and prevention |
| Remainder of title |
concepts and techniques / |
| Statement of responsibility, etc. |
Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. |
| Place of publication, distribution, etc. |
New York : |
| Name of publisher, distributor, etc. |
Springer, |
| Date of publication, distribution, etc. |
c2010. |
| 490 1# - SERIES STATEMENT |
| Series statement |
Advances in information security ; |
| Volume/sequential designation |
ADIS 47 |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc. note |
Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Network Attacks. -- Detection Approaches. -- Data Collection. -- Theoretical Foundation Of Detection. -- Architecture and Implementation. -- Alert Management and Correlation. -- Evaluation Criteria. -- Intrusion Response. -- Examples of Commercial and Open Source IDSs |
| 506 ## - RESTRICTIONS ON ACCESS NOTE |
| Terms governing access |
License restrictions may limit access. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
Intrusion Detection and Prevention is a rapidly growing field that deals with detecting and responding to malicious network traffic and computer misuse. Intrusion detection is the process of identifying and (possibly) responding to malicious activities targeted at computing and network resources. Any hardware or software automation that monitors, detects or responds to events occurring in a network or on a host computer is considered relevant to the intrusion detection approach. Different intrusion detection systems provide varying functionalities and benefits. Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response. Additionally, it provides an overview of some of the commercially/publicly available intrusion detection and response systems--Cover. |
| 563 ## - BINDING INFORMATION |
| Binding note |
hard cover |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Intrusion detection systems (Computer security) |
| 9 (RLIN) |
6106 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Intrusion detection systems (Computer security) |
| Form subdivision |
Case studies. |
| 9 (RLIN) |
81728 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer networks |
| General subdivision |
Security measures. |
| 9 (RLIN) |
466 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer networks |
| General subdivision |
Security measures |
| Form subdivision |
Case studies. |
| 9 (RLIN) |
81729 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Lu, Wei, |
| Dates associated with a name |
1980- |
| 9 (RLIN) |
81730 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Tavallaee, Mahbod. |
| 9 (RLIN) |
81731 |
| 773 #0 - HOST ITEM ENTRY |
| Title |
SpringerLink ebooks - Computer Science (2010) |
| 830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
| Uniform title |
Advances in information security |
| 9 (RLIN) |
81732 |
| 856 40 - ELECTRONIC LOCATION AND ACCESS |
| Uniform Resource Identifier |
<a href="http://www.columbia.edu/cgi-bin/cul/resolve?clio7867707">http://www.columbia.edu/cgi-bin/cul/resolve?clio7867707</a> |
| Public note |
Full text available from SpringerLink ebooks - Computer Science (2010) |
| 910 ## - USER-OPTION DATA (OCLC) |
| User-option data |
Library of Congress record |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
|
| Koha item type |
Book |