Introduction to network security / (Record no. 2949)

MARC details
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100227s2009 flua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2008040768
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781584885436 (hbk. : alk. paper)
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) u3966
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaNU
Transcribing agency EG-CaNU
Modifying agency EG-CaNU
042 ## - AUTHENTICATION CODE
Authentication code ncode
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Jacobson, Douglas.
9 (RLIN) 1246
245 10 - TITLE STATEMENT
Title Introduction to network security /
Statement of responsibility, etc. Douglas Jacobson.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boca Raton :
Name of publisher, distributor, etc. Chapman & Hall/CRC,
Date of publication, distribution, etc. c2009.
300 ## - PHYSICAL DESCRIPTION
Extent xxi, 478 p. :
Other physical details ill. ;
Dimensions 25 cm.
440 #1 - SERIES STATEMENT/ADDED ENTRY--TITLE
Title Chapman & Hall/CRC computer and information science series
9 (RLIN) 7832
500 ## - GENERAL NOTE
General note "A Chapman & Hall book."
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Introduction to Network Concepts and Threats -- Network Architecture -- The Internet -- Taxonomy of Network-Based Vulnerabilities -- Physical Network Layer Overview -- Network Layer Protocols -- Transport Layer Protocols -- Application-Layer Security -- Application Layer Overview -- Email -- Web Security -- Remote Access Security -- Network-Based Mitigation -- Common Network Security Devices.
520 ## - SUMMARY, ETC.
Summary, etc. Unlike data communications of the past, today’s networks consist of numerous devices that handle the data as it passes from the sender to the receiver. However, security concerns are frequently raised in circumstances where interconnected computers use a network not controlled by any one entity or organization. Introduction to Network Security examines various network protocols, focusing on vulnerabilities, exploits, attacks, and methods to mitigate an attack.
596 ## -
-- 1
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
9 (RLIN) 7833
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
9 (RLIN) 7834
920 ## -
-- 1584885432 (hbk. : alk. paper)
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Total Renewals Full call number Barcode Date last seen Date last checked out Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main library Main library General Stacks 01/26/2020 PURCHASE 1 2 005.8 / JA.I 2009 006155 05/11/2023 03/08/2023 1 11/24/2019 Books