Network security illustrated / (Record no. 29784)

000 -LEADER
fixed length control field 03063cam a2200241 a 4500
001 - CONTROL NUMBER
control field vtls002842260
003 - CONTROL NUMBER IDENTIFIER
control field MY-SjTCS
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200306154529.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 110218s2004 nyua 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0071415041 (pbk.)
039 #9 - LEVEL OF BIBLIOGRAPHIC CONTROL AND CODING DETAIL [OBSOLETE]
Level of rules in bibliographic description 201906261012
Level of effort used to assign nonsubject heading access points shuhada
Level of effort used to assign subject headings 201102181226
Level of effort used to assign classification VLOAD
-- 200407271957
-- VLOAD
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number ALB
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Albanese, Jason.
9 (RLIN) 213108
245 10 - TITLE STATEMENT
Title Network security illustrated /
Statement of responsibility, etc. Jason Albanese, Wes Sonnenreich.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New York :
Name of publisher, distributor, etc. McGraw-Hill,
Date of publication, distribution, etc. c2004.
300 ## - PHYSICAL DESCRIPTION
Extent xxii, 423 p. :
Other physical details ill. ;
Dimensions 24 cm.
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note - Pt. 8. Storing information. 22. Storing information : storage media. 23. Storing information: local file systems. 24. Storing information : network file systems. 25. Storing information: databases. - Pt. 9. Hiding information. 26. Hiding information : cryptography. 27. Hiding information: cryptanalysis. 28. Hiding information: steganography. - Pt. 10. Accessing information. 29. Accessing information : client-server architecture. 30. Accessing information: internet services. 31. Accessing information: remote access. 32. Accessing information: peer-to-peer networking. - Pt. 11. Ensuring availability. 33.Ensuring availability : raid. 34. Ensuring availability : clustering. 35. Ensuring availability : backup systems. - Pt. 12. Decting intrusions. 36. Detecting intrusions : file integrity. 37. Detecting intrusions : viruses and trojans. 38. Detecting intrusions : network scanners. 39. Detecting intrusions : network sniffers. 40. Detecting intrusions : logging and analysis. - Index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Introduction. - Acknowledgements. - Pt. 1. Managing security. 1. Managing security : the security assessment. 2. Managing security : systems and network monitoring. - Pt. 2. Outsourcing options. 3. Outsourcing options : outsourcing network monitoring. 4. Outsourcing options : outsourcing disaster preventions. 5. Outsourcing options : outsourcing proactive security. - Pt. 3. Reserving rights. 6. Reserving rights : digital rights management. 7. Reserve rights : copy protection. - Pt. 4. Determining identity. 8. Determining identity : passwords. 9. Determining identity : digial certificates. 10. Determining identity : portable identifiers. 11. Determining identity : Biometrics. - Pt. 5. Preserving privacy. 12. Preserving Privacy: anonymity. 13. Preserving Privacy: User tracking. 14. Preserving Privacy : Spam management. - Pt. 6. Connecting networks. 15. Connecting networks : Networking hardware. 16. Connecting networks: Wireless connections. 17. Connecting networks : network lingo. - Pt. 7. Hardenig hetworks. 18. Hardening networks : firewalls. 19. Hardening networks : Network address translation. 20. Hardening networks : virtual private networks. 21. Hardening networks : traffic shaping.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
9 (RLIN) 9098
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Sonnenreich, Wes,
Dates associated with a name 1974-
9 (RLIN) 213109
920 ## - Programme
Programme CIT(RMIT) : 546082
999 ## - SYSTEM CONTROL NUMBERS (KOHA)
Koha biblionumber 29784
Koha biblioitemnumber 29784
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Date acquired Total Checkouts Barcode Date last seen Date last checked out Copy number Uniform Resource Identifier Koha item type Public note
          Taylor's Library-TU Taylor's Library-TU 2004-07-27 16 5000034409 2019-12-05 2016-04-18 1 Floor 3, Shelf 1 , Side 1, TierNo 1, BayNo 7 Main Collection SOCIT,15009,03,GR