Introduction to network security / (Record no. 2949)
[ view plain ]
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
|---|---|
| fixed length control field | 100227s2009 flua b 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
| LC control number | 2008040768 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781584885436 (hbk. : alk. paper) |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (Sirsi) u3966 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | EG-CaNU |
| Transcribing agency | EG-CaNU |
| Modifying agency | EG-CaNU |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | ncode |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| Edition number | 22 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Jacobson, Douglas. |
| 9 (RLIN) | 1246 |
| 245 10 - TITLE STATEMENT | |
| Title | Introduction to network security / |
| Statement of responsibility, etc. | Douglas Jacobson. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Boca Raton : |
| Name of publisher, distributor, etc. | Chapman & Hall/CRC, |
| Date of publication, distribution, etc. | c2009. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xxi, 478 p. : |
| Other physical details | ill. ; |
| Dimensions | 25 cm. |
| 440 #1 - SERIES STATEMENT/ADDED ENTRY--TITLE | |
| Title | Chapman & Hall/CRC computer and information science series |
| 9 (RLIN) | 7832 |
| 500 ## - GENERAL NOTE | |
| General note | "A Chapman & Hall book." |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc. note | Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Introduction to Network Concepts and Threats -- Network Architecture -- The Internet -- Taxonomy of Network-Based Vulnerabilities -- Physical Network Layer Overview -- Network Layer Protocols -- Transport Layer Protocols -- Application-Layer Security -- Application Layer Overview -- Email -- Web Security -- Remote Access Security -- Network-Based Mitigation -- Common Network Security Devices. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Unlike data communications of the past, today’s networks consist of numerous devices that handle the data as it passes from the sender to the receiver. However, security concerns are frequently raised in circumstances where interconnected computers use a network not controlled by any one entity or organization. Introduction to Network Security examines various network protocols, focusing on vulnerabilities, exploits, attacks, and methods to mitigate an attack. |
| 596 ## - | |
| -- | 1 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer networks |
| General subdivision | Security measures. |
| 9 (RLIN) | 7833 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer security. |
| 9 (RLIN) | 7834 |
| 920 ## - | |
| -- | 1584885432 (hbk. : alk. paper) |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Total Checkouts | Total Renewals | Full call number | Barcode | Date last seen | Date last checked out | Copy number | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Main library | Main library | General Stacks | 01/26/2020 | PURCHASE | 1 | 2 | 005.8 / JA.I 2009 | 006155 | 05/11/2023 | 03/08/2023 | 1 | 11/24/2019 | Books |