MARC details
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
090809s2004 caua 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2004276086 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9780072229547 |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(Sirsi) u2211 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
EG-CaNU |
| Transcribing agency |
EG-CaNU |
| Modifying agency |
EG-CaNU |
| 042 ## - AUTHENTICATION CODE |
| Authentication code |
ncode |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Edition number |
22 |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Endorf, Carl F., |
| Dates associated with a name |
1969- |
| 9 (RLIN) |
3873 |
| 245 10 - TITLE STATEMENT |
| Title |
Intrusion detection & prevention / |
| Statement of responsibility, etc. |
Carl Endorf, Dr. Eugene Schultz, Jim Mellander. |
| 246 3# - VARYING FORM OF TITLE |
| Title proper/short title |
Intrusion detection and prevention |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. |
| Place of publication, distribution, etc. |
New York : |
| Name of publisher, distributor, etc. |
McGraw-Hill/Osborne, |
| Date of publication, distribution, etc. |
c2004. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xxxi, 386 p. : |
| Other physical details |
ill. ; |
| Dimensions |
24 cm. |
| 500 ## - GENERAL NOTE |
| General note |
Includes index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Part I: Intrusion Detection: Primer -- 1: Understanding Intrusion Detection -- 2: Crash Course in the Internet Protocol Suite -- 3: Unauthorized Activity I -- 4: Unauthorized Activity II -- 5: Tcpdump -- Part II: Architecture -- 6: IDS and IPS Architecture -- 7: IDS and IPS Internals -- Part III: Implementation and Deployment -- 8: Internet Security System’s RealSecure -- 9: Cisco Secure IDS -- 10: Snort -- 11: NFR Security -- Part IV: Security and IDS Management -- 12: Data Correlation -- 13: Incident Response -- 14: Policy and Procedures -- 15: Laws, Standards, and Organizations -- 16: Security Business Issues -- 17: The Future of Intrusion Detection and Prevention -- A: Intrusion Detection and Prevention Systems. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
Authors Carl Endorf, Eugene Schultz, and Jim Mellander deliver the hands-on implementation techniques that IT professionals need. Learn to implement the top intrusion detection products into real-world networked environments and covers the most popular intrusion detection tools including Internet Security Systems' Black ICE & RealSecure, Cisco Systems' Secure IDS, Computer Associates’ eTrust, Entercept, and the open source Snort tool. |
| 596 ## - |
| -- |
1 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer networks |
| General subdivision |
Security measures. |
| 9 (RLIN) |
3874 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Internet |
| General subdivision |
Security measures. |
| 9 (RLIN) |
3875 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer security. |
| 9 (RLIN) |
3876 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Schultz, Eugene. |
| 9 (RLIN) |
3877 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Mellander, Jim. |
| 9 (RLIN) |
3878 |