<?xml version="1.0" encoding="UTF-8"?>
<record
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>01566    a2200241   4500</leader>
  <controlfield tag="003">Nust</controlfield>
  <controlfield tag="005">20230821125550.0</controlfield>
  <datafield tag="010" ind1=" " ind2=" ">
    <subfield code="a">  2003051481</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="c">1555583067</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
    <subfield code="c">Nust</subfield>
  </datafield>
  <datafield tag="082" ind1="0" ind2="0">
    <subfield code="a">005.8,RIT</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
    <subfield code="a">Rittinghouse, John W.</subfield>
    <subfield code="9">94191</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
    <subfield code="a">Cybersecurity operations handbook /</subfield>
    <subfield code="c">John W. Rittinghouse, William M. Hancock.</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="a">Amsterdam ;</subfield>
    <subfield code="a">Boston :</subfield>
    <subfield code="b">Elsevier Digital Press,</subfield>
    <subfield code="c">c2003.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">xli, 1287 p. :</subfield>
    <subfield code="b">ill. ;</subfield>
    <subfield code="c">26 cm.</subfield>
  </datafield>
  <datafield tag="505" ind1=" " ind2=" ">
    <subfield code="a">Why Worry about Security (Page-1), Network Security Management Basics (Page 25), Security Foundations (Page-63), Firewalls and Perimeters (Page-115), VPNS and Remote Access (Page-155), Intrusion Detection in Depth (Page-191), Securing Communications (Page-231), Keys, Signatures, Certificates and PKI (Page-269), Hacker Exploits (Page-293), Incident Handling Basics (Page-323), Forensics, Investigation and Response (Page-365), Security Diligence (Page-427), Business Continuity Planning (Page-441), Auditing fundamentals (Page-457), Security Management issues (Page-493), Outsourcing and Security (Page-525), Security Service level Agreements (Page-581), Future Trends in Security (Page-601),Sample Policy Documents (Page-631),</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computer networks</subfield>
    <subfield code="x">Security measures.</subfield>
    <subfield code="9">466</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computer security.</subfield>
    <subfield code="9">570</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
    <subfield code="a">Hancock, Bill,</subfield>
    <subfield code="d">1957-</subfield>
    <subfield code="9">95147</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="2">
    <subfield code="3">Publisher description</subfield>
    <subfield code="u">http://www.loc.gov/catdir/description/els031/2003051481.html</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="2">
    <subfield code="3">Table of contents</subfield>
    <subfield code="u">http://www.loc.gov/catdir/toc/els031/2003051481.html</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
    <subfield code="c">REF</subfield>
    <subfield code="2">ddc</subfield>
  </datafield>
  <datafield tag="999" ind1=" " ind2=" ">
    <subfield code="c">179905</subfield>
    <subfield code="d">179905</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="2">ddc</subfield>
    <subfield code="4">0</subfield>
    <subfield code="7">0</subfield>
    <subfield code="a">MCS</subfield>
    <subfield code="b">MCS</subfield>
    <subfield code="c">REF</subfield>
    <subfield code="d">2016-12-12</subfield>
    <subfield code="o">005.8,RIT</subfield>
    <subfield code="p">MCS31764</subfield>
    <subfield code="r">2016-12-08</subfield>
    <subfield code="w">2016-12-12</subfield>
    <subfield code="y">BK</subfield>
    <subfield code="z">Almirah No.18, Shelf No.3</subfield>
  </datafield>
</record>
