Practical intrusion analysis : (Record no. 17946)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01330cam a2200277 a 4500 |
001 - CONTROL NUMBER | |
control field | a3986 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | SIRSI |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 090512s2010 njuab b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
LC control number | 2009019158 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780321591807 (pbk. : alk. paper) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0321591801 (pbk. : alk. paper) |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (Sirsi) i9780321591807 |
050 00 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK5105.59 |
Item number | .T76 2010 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition information | 22 |
092 ## - LOCALLY ASSIGNED DEWEY CALL NUMBER (OCLC) | |
Classification number | |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Trost, Ryan. |
245 10 - TITLE STATEMENT | |
Title | Practical intrusion analysis : |
Remainder of title | prevention and detection for the twenty-first century / |
Statement of responsibility, etc. | Ryan Trost. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Upper Saddle River, NJ : |
Name of publisher, distributor, etc. | Addison-Wesley, |
Date of publication, distribution, etc. | c2010. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxiv, 455 p. : |
Other physical details | ill., maps ; |
Dimensions | 24 cm. |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Network overview -- Infrastructure monitoring -- Intrusion detection systems -- Lifecycle of a vulnerability -- Proactive intrusion prevention and response via attack graphs -- Network flows and anomaly detection -- Web application firewalls -- Wireless IDS/IPS -- Physical intrusion detection for IT -- Geospatial intrusion detection -- Visual data communications -- Return on investment : business justification. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks |
General subdivision | Monitoring. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computers |
General subdivision | Access control. |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection | Home library | Current library | Shelving location | Total checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Library of Congress Classification | AUE Library Collection | MAIN | MAIN | General | TK5105.59 .T76 2010 | 10041951 | 03/13/2021 | 1 | 11/19/2019 | Books | |||||
Library of Congress Classification | AUE Library Collection | MAIN | MAIN | General | TK5105.59 .T76 2010 | 10041861 | 03/13/2021 | 2 | 11/19/2019 | Books |