<?xml version="1.0" encoding="UTF-8"?>
<record
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>01505    a2200229   4500</leader>
  <controlfield tag="003">Nust</controlfield>
  <controlfield tag="005">20170207154009.0</controlfield>
  <datafield tag="010" ind1=" " ind2=" ">
    <subfield code="a">  2001088118</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">0782129161</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
    <subfield code="c">Nust</subfield>
  </datafield>
  <datafield tag="082" ind1="0" ind2="0">
    <subfield code="a">005.8</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
    <subfield code="a">Brenton, Chris.</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
    <subfield code="a">Active defense : (E-BOOK)</subfield>
    <subfield code="b">a comprehensive guide to network security /</subfield>
    <subfield code="c">Chris Brenton with Cameron Hunt.</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="a">San Francisco :</subfield>
    <subfield code="b">Sybex,</subfield>
    <subfield code="c">c2001.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">xxvii, 723 p. :</subfield>
    <subfield code="b">ill. ;</subfield>
    <subfield code="c">23 cm. +</subfield>
    <subfield code="e">1 CD-ROM (4 3/4 in.)</subfield>
  </datafield>
  <datafield tag="500" ind1=" " ind2=" ">
    <subfield code="a">Includes index.</subfield>
  </datafield>
  <datafield tag="505" ind1=" " ind2=" ">
    <subfield code="a">Chapter 1 - Why Secure Your Network? &#x2013; 8 Chapter 2 - How Much Security Do You Need? &#x2013; 14 Chapter 3 - Understanding How Network Systems Communicate &#x2013; 27 Chapter 4 - Topology Security &#x2013; 62 Chapter 5 - Firewalls &#x2013; 81 Chapter 6 - Configuring Cisco Router Security Features &#x2013; 116 Chapter 7 - Check Point&#x2019;s FireWall-1 &#x2013; 143 Chapter 8 - Intrusion Detection Systems &#x2013; 168 Chapter 9 - Authentication and Encryption &#x2013; 187 Chapter 10 - Virtual Private Networking &#x2013; 202 Chapter 11 - Viruses, Trojans, and Worms: Oh My! &#x2013; 218 Chapter 12 - Disaster Prevention and Recovery &#x2013; 233 Chapter 13 - NetWare &#x2013; 256 Chapter 14 - NT and Windows 2000 &#x2013; 273 Chapter 15 - UNIX &#x2013; 309 Chapter 16 - The Anatomy of an Attack &#x2013; 334 Chapter 17 - Staying Ahead of Attacks - 352</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computer networks</subfield>
    <subfield code="x">Security measures.</subfield>
  </datafield>
  <datafield tag="651" ind1=" " ind2=" ">
    <subfield code="a">E-BOOK</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
    <subfield code="a">Hunt, Cameron.</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="2">
    <subfield code="3">Publisher description</subfield>
    <subfield code="u">http://www.loc.gov/catdir/enhancements/fy0611/2001088118-d.html</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
    <subfield code="2">ddc</subfield>
    <subfield code="c">BK</subfield>
  </datafield>
  <datafield tag="999" ind1=" " ind2=" ">
    <subfield code="c">191137</subfield>
    <subfield code="d">191137</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="2">ddc</subfield>
    <subfield code="4">0</subfield>
    <subfield code="7">0</subfield>
    <subfield code="8">NFIC</subfield>
    <subfield code="a">MCS</subfield>
    <subfield code="b">MCS</subfield>
    <subfield code="d">2016-12-12</subfield>
    <subfield code="l">0</subfield>
    <subfield code="o">005.8  CHR</subfield>
    <subfield code="p">MCSEB-614</subfield>
    <subfield code="r">2016-12-08</subfield>
    <subfield code="w">2016-12-12</subfield>
    <subfield code="y">BK</subfield>
  </datafield>
</record>
