Network intrusion detection / (Record no. 6620)

MARC details
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 080717s2002 inua 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2001099565
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0735712654
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) u765
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaNU
Transcribing agency EG-CaNU
Modifying agency EG-CaNU
042 ## - AUTHENTICATION CODE
Authentication code ncode
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Northcutt, Stephen.
9 (RLIN) 13701
245 10 - TITLE STATEMENT
Title Network intrusion detection /
Statement of responsibility, etc. Stephen Northcutt, Judy Novak.
250 ## - EDITION STATEMENT
Edition statement 3rd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Indianapolis, Ind. :
Name of publisher, distributor, etc. New Riders Pub.,
Date of publication, distribution, etc. 2002, c2003.
300 ## - PHYSICAL DESCRIPTION
Extent xvii, 490 p. :
Other physical details ill. ;
Dimensions 23 cm.
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note i. tcp/ip -- ii. traffic analysis. -- iii. filters/rules for network monitoring. -- iv. intrusion infrastructure -- v. appendixes -- index.
520 ## - SUMMARY, ETC.
Summary, etc. The Chief Information Warfare Officer for the entire United States teaches you how to protect your corporate network. This book is a training aid and reference for intrusion detection analysts. While the authors refer to research and theory, they focus their attention on providing practical information. The authors are literally the most recognized names in this specialized field, with unparalleled experience in defending our country's government and military computer networks. New to this edition is coverage of packet dissection, IP datagram fields, forensics, and snort filter
520 ## - SUMMARY, ETC.
Summary, etc. US Chief Information Warfare Officer Stephen Northcutt provides information on how to protect a corporate network. Included is advice and technical content, reviewed by the top names in network security.
596 ## -
-- 1
630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE
Uniform title CIT.
9 (RLIN) 14
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
9 (RLIN) 13702
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet
General subdivision Security measures.
9 (RLIN) 13703
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
9 (RLIN) 13704
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Novak, Judy.
9 (RLIN) 6586
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main library Main library General Stacks 01/26/2020 ACA-P   005.8 / NO.N 2002 000979 11/24/2019 1 11/24/2019 Books