000 -LEADER |
fixed length control field |
03063cam a2200241 a 4500 |
001 - CONTROL NUMBER |
control field |
vtls002842260 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
MY-SjTCS |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20200306154529.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
110218s2004 nyua 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0071415041 (pbk.) |
039 #9 - LEVEL OF BIBLIOGRAPHIC CONTROL AND CODING DETAIL [OBSOLETE] |
Level of rules in bibliographic description |
201906261012 |
Level of effort used to assign nonsubject heading access points |
shuhada |
Level of effort used to assign subject headings |
201102181226 |
Level of effort used to assign classification |
VLOAD |
-- |
200407271957 |
-- |
VLOAD |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
ALB |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Albanese, Jason. |
9 (RLIN) |
213108 |
245 10 - TITLE STATEMENT |
Title |
Network security illustrated / |
Statement of responsibility, etc. |
Jason Albanese, Wes Sonnenreich. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
New York : |
Name of publisher, distributor, etc. |
McGraw-Hill, |
Date of publication, distribution, etc. |
c2004. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxii, 423 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm. |
500 ## - GENERAL NOTE |
General note |
Includes index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
- Pt. 8. Storing information. 22. Storing information : storage media. 23. Storing information: local file systems. 24. Storing information : network file systems. 25. Storing information: databases. - Pt. 9. Hiding information. 26. Hiding information : cryptography. 27. Hiding information: cryptanalysis. 28. Hiding information: steganography. - Pt. 10. Accessing information. 29. Accessing information : client-server architecture. 30. Accessing information: internet services. 31. Accessing information: remote access. 32. Accessing information: peer-to-peer networking. - Pt. 11. Ensuring availability. 33.Ensuring availability : raid. 34. Ensuring availability : clustering. 35. Ensuring availability : backup systems. - Pt. 12. Decting intrusions. 36. Detecting intrusions : file integrity. 37. Detecting intrusions : viruses and trojans. 38. Detecting intrusions : network scanners. 39. Detecting intrusions : network sniffers. 40. Detecting intrusions : logging and analysis. - Index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Introduction. - Acknowledgements. - Pt. 1. Managing security. 1. Managing security : the security assessment. 2. Managing security : systems and network monitoring. - Pt. 2. Outsourcing options. 3. Outsourcing options : outsourcing network monitoring. 4. Outsourcing options : outsourcing disaster preventions. 5. Outsourcing options : outsourcing proactive security. - Pt. 3. Reserving rights. 6. Reserving rights : digital rights management. 7. Reserve rights : copy protection. - Pt. 4. Determining identity. 8. Determining identity : passwords. 9. Determining identity : digial certificates. 10. Determining identity : portable identifiers. 11. Determining identity : Biometrics. - Pt. 5. Preserving privacy. 12. Preserving Privacy: anonymity. 13. Preserving Privacy: User tracking. 14. Preserving Privacy : Spam management. - Pt. 6. Connecting networks. 15. Connecting networks : Networking hardware. 16. Connecting networks: Wireless connections. 17. Connecting networks : network lingo. - Pt. 7. Hardenig hetworks. 18. Hardening networks : firewalls. 19. Hardening networks : Network address translation. 20. Hardening networks : virtual private networks. 21. Hardening networks : traffic shaping. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures. |
9 (RLIN) |
9098 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Sonnenreich, Wes, |
Dates associated with a name |
1974- |
9 (RLIN) |
213109 |
920 ## - Programme |
Programme |
CIT(RMIT) : 546082 |
999 ## - SYSTEM CONTROL NUMBERS (KOHA) |
Koha biblionumber |
29784 |
Koha biblioitemnumber |
29784 |