Network and system security / (Record no. 7190)
[ view plain ]
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
|---|---|
| fixed length control field | 120626s2010 maua b 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
| LC control number | 2009052077 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781597495356 |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (Sirsi) u8292 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | EG-CaNU |
| Transcribing agency | EG-CaNU |
| Modifying agency | EG-CaNU |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | ncode |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| Edition number | 22 |
| 245 00 - TITLE STATEMENT | |
| Title | Network and system security / |
| Statement of responsibility, etc. | editor, John R. Vacca. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Burlington, MA : |
| Name of publisher, distributor, etc. | Syngress/Elsevier, |
| Date of publication, distribution, etc. | c2010. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xxxv, 368 p. : |
| Other physical details | ill. ; |
| Dimensions | 24 cm. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc. note | Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Building a secure organization -- A cryptography primer -- Preventing system intrusions -- Guarding against network intrusions -- Unix and Linux security -- Eliminating the security weakness of Linux and Unix operating systems -- Internet security -- The botnet problem -- Intranet security -- Local area network security -- Wireless network security -- Cellular network security -- Radio frequency identification security. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Network and System Security provides focused coverage of network and system security technologies. Explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization; cryptography; system intrusion; UNIX and Linux security; Internet security, intranet security; LAN security; wireless network security; cellular network security, RFID security, and more. |
| 596 ## - | |
| -- | 1 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer networks |
| General subdivision | Security measures. |
| 9 (RLIN) | 15225 |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Vacca, John R. |
| 9 (RLIN) | 15226 |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Total Checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Main library | Main library | General Stacks | 01/26/2020 | PURCHASE | 005.8 / VA.N 2010 | 011627 | 11/24/2019 | 1 | 11/24/2019 | Books |