Internet denial of service : (Record no. 42252)

000 -LEADER
fixed length control field 01495cam a22002654a 4500
001 - CONTROL NUMBER
control field vtls003027153
003 - CONTROL NUMBER IDENTIFIER
control field MY-SjTCS
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200306163438.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 110218s2005 njua b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0131475738 (pbk.)
039 #9 - LEVEL OF BIBLIOGRAPHIC CONTROL AND CODING DETAIL [OBSOLETE]
Level of rules in bibliographic description 201102261139
Level of effort used to assign nonsubject heading access points shuhada
Level of effort used to assign subject headings 201102181247
Level of effort used to assign classification VLOAD
Level of effort used to assign subject headings 200606111535
Level of effort used to assign classification pushpa
Level of effort used to assign subject headings 200605251028
Level of effort used to assign classification fadilah
-- 200604211146
-- malathy
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number INT
245 00 - TITLE STATEMENT
Title Internet denial of service :
Remainder of title attack and defense mechanisms /
Statement of responsibility, etc. Jelena Mirkovic ... [et al.].
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Upper Saddle River, N.J. :
Name of publisher, distributor, etc. Prentice Hall Professional Technical Reference,
Date of publication, distribution, etc. c2005.
300 ## - PHYSICAL DESCRIPTION
Extent xxii, 372 p. :
Other physical details ill. ;
Dimensions 24 cm.
490 1# - SERIES STATEMENT
Series statement The Radia Perlman series in computer networking and security
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (p. 335-350) and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Introduction - 2. Understanding Denial of service - 3. History of DoS and DDoS - 4. How attacks are waged - 5. An overview of DDoS defenses - 6. Detailed defense approaches - 7. Survey of research defense approaches - 8. Legal issues - 9. Conclusions - Appendix A: Glossary - Appendix B: Survey of Commercial defense approaches - Appendix C : DDos data - References - Index.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
9 (RLIN) 9098
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet
General subdivision Security measures.
9 (RLIN) 9099
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes
General subdivision Prevention.
9 (RLIN) 21381
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Mirkovic, Jelena.
9 (RLIN) 233601
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Radia Perlman series in computer networking and security.
9 (RLIN) 50679
920 ## - Programme
Programme CIT(RMIT): 547156
999 ## - SYSTEM CONTROL NUMBERS (KOHA)
Koha biblionumber 42252
Koha biblioitemnumber 42252
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Date acquired Total Checkouts Barcode Date last seen Date last checked out Copy number Koha item type Public note
          Taylor's Library-TU Taylor's Library-TU 2006-05-25 9 5000040712 2019-12-05 2018-11-16 1 Main Collection SOCIT,15009,03,GR