Network security essentials : (Record no. 7188)
[ view plain ]
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
|---|---|
| fixed length control field | 120626s2011 maua b 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
| LC control number | 2010003272 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9780137067923 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 0137067925 |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (Sirsi) u8290 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | EG-CaNU |
| Transcribing agency | EG-CaNU |
| Modifying agency | EG-CaNU |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | ncode |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| Edition number | 22 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Stallings, William. |
| 9 (RLIN) | 440 |
| 245 10 - TITLE STATEMENT | |
| Title | Network security essentials : |
| Remainder of title | applications and standards / |
| Statement of responsibility, etc. | William Stallings. |
| 250 ## - EDITION STATEMENT | |
| Edition statement | 4th ed. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Boston : |
| Name of publisher, distributor, etc. | Prentice Hall, |
| Date of publication, distribution, etc. | c2011. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xiv, 417 p. : |
| Other physical details | ill. ; |
| Dimensions | 24 cm. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc. note | Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Chapter 1 Introduction -- Chapter 2 Symmetric Encryption and Message Confidentiality -- Chapter 3 Public-Key Cryptography and Message Authentication -- Chapter 4 Key Distribution and User Authentication -- Chapter 5 Transport-Level Security -- Chapter 6 Wireless Network Security -- Chapter 7 Electronic Mail Security -- Chapter 8 IP Security -- Chapter 9 Intruders -- Chapter 10 Malicious Software -- Chapter 11 Firewalls -- Chapter 12 Network Management Security -- Chapter 13 Legal and Ethical Issues. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. Network Security: Applications and Standards, 4/e provides a practical survey of network security applications and standards, with an emphasis on applications that are widely used on the Internet and for corporate networks. An unparalleled support package for instructors and students ensures a successful teaching and learning experience. |
| 596 ## - | |
| -- | 1 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer networks |
| General subdivision | Security measures. |
| 9 (RLIN) | 15223 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer security. |
| 9 (RLIN) | 15224 |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Total Checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Main library | Main library | General Stacks | 01/26/2020 | PURCHASE | 005.8 / ST.N 2011 | 011594 | 11/24/2019 | 1 | 11/24/2019 | Books | |||||
| Dewey Decimal Classification | Main library | Main library | General Stacks | 01/26/2020 | PURCHASE | 005.8 / ST.N 2011 | 011622 | 11/24/2019 | 2 | 11/24/2019 | Books |