Network intrusion detection / (Record no. 6620)
[ view plain ]
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
|---|---|
| fixed length control field | 080717s2002 inua 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
| LC control number | 2001099565 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 0735712654 |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (Sirsi) u765 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | EG-CaNU |
| Transcribing agency | EG-CaNU |
| Modifying agency | EG-CaNU |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | ncode |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| Edition number | 22 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Northcutt, Stephen. |
| 9 (RLIN) | 13701 |
| 245 10 - TITLE STATEMENT | |
| Title | Network intrusion detection / |
| Statement of responsibility, etc. | Stephen Northcutt, Judy Novak. |
| 250 ## - EDITION STATEMENT | |
| Edition statement | 3rd ed. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Indianapolis, Ind. : |
| Name of publisher, distributor, etc. | New Riders Pub., |
| Date of publication, distribution, etc. | 2002, c2003. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xvii, 490 p. : |
| Other physical details | ill. ; |
| Dimensions | 23 cm. |
| 500 ## - GENERAL NOTE | |
| General note | Includes index. |
| 505 0# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | i. tcp/ip -- ii. traffic analysis. -- iii. filters/rules for network monitoring. -- iv. intrusion infrastructure -- v. appendixes -- index. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | The Chief Information Warfare Officer for the entire United States teaches you how to protect your corporate network. This book is a training aid and reference for intrusion detection analysts. While the authors refer to research and theory, they focus their attention on providing practical information. The authors are literally the most recognized names in this specialized field, with unparalleled experience in defending our country's government and military computer networks. New to this edition is coverage of packet dissection, IP datagram fields, forensics, and snort filter |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | US Chief Information Warfare Officer Stephen Northcutt provides information on how to protect a corporate network. Included is advice and technical content, reviewed by the top names in network security. |
| 596 ## - | |
| -- | 1 |
| 630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE | |
| Uniform title | CIT. |
| 9 (RLIN) | 14 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer networks |
| General subdivision | Security measures. |
| 9 (RLIN) | 13702 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Internet |
| General subdivision | Security measures. |
| 9 (RLIN) | 13703 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer security. |
| 9 (RLIN) | 13704 |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Novak, Judy. |
| 9 (RLIN) | 6586 |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Total Checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Main library | Main library | General Stacks | 01/26/2020 | ACA-P | 005.8 / NO.N 2002 | 000979 | 11/24/2019 | 1 | 11/24/2019 | Books |