000 -LEADER |
fixed length control field |
01495cam a22002654a 4500 |
001 - CONTROL NUMBER |
control field |
vtls003027153 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
MY-SjTCS |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20200306163438.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
110218s2005 njua b 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0131475738 (pbk.) |
039 #9 - LEVEL OF BIBLIOGRAPHIC CONTROL AND CODING DETAIL [OBSOLETE] |
Level of rules in bibliographic description |
201102261139 |
Level of effort used to assign nonsubject heading access points |
shuhada |
Level of effort used to assign subject headings |
201102181247 |
Level of effort used to assign classification |
VLOAD |
Level of effort used to assign subject headings |
200606111535 |
Level of effort used to assign classification |
pushpa |
Level of effort used to assign subject headings |
200605251028 |
Level of effort used to assign classification |
fadilah |
-- |
200604211146 |
-- |
malathy |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
INT |
245 00 - TITLE STATEMENT |
Title |
Internet denial of service : |
Remainder of title |
attack and defense mechanisms / |
Statement of responsibility, etc. |
Jelena Mirkovic ... [et al.]. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Upper Saddle River, N.J. : |
Name of publisher, distributor, etc. |
Prentice Hall Professional Technical Reference, |
Date of publication, distribution, etc. |
c2005. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxii, 372 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm. |
490 1# - SERIES STATEMENT |
Series statement |
The Radia Perlman series in computer networking and security |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references (p. 335-350) and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
1. Introduction - 2. Understanding Denial of service - 3. History of DoS and DDoS - 4. How attacks are waged - 5. An overview of DDoS defenses - 6. Detailed defense approaches - 7. Survey of research defense approaches - 8. Legal issues - 9. Conclusions - Appendix A: Glossary - Appendix B: Survey of Commercial defense approaches - Appendix C : DDos data - References - Index. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures. |
9 (RLIN) |
9098 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Internet |
General subdivision |
Security measures. |
9 (RLIN) |
9099 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer crimes |
General subdivision |
Prevention. |
9 (RLIN) |
21381 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Mirkovic, Jelena. |
9 (RLIN) |
233601 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Radia Perlman series in computer networking and security. |
9 (RLIN) |
50679 |
920 ## - Programme |
Programme |
CIT(RMIT): 547156 |
999 ## - SYSTEM CONTROL NUMBERS (KOHA) |
Koha biblionumber |
42252 |
Koha biblioitemnumber |
42252 |