Network Security: (Record no. 24106)

MARC details
000 -LEADER
fixed length control field 02377nam a2200217 a 4500
001 - CONTROL NUMBER
control field ASIN0123116333
003 - CONTROL NUMBER IDENTIFIER
control field AUCL
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200305093150.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 111101s2005 xxu eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780123116338
040 ## - CATALOGING SOURCE
Transcribing agency AUKP
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8 HAR
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Harrington, Jan L.
245 10 - TITLE STATEMENT
Title Network Security:
Remainder of title A Practical Approach
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Bostan.
Name of publisher, distributor, etc. Elsevier
Date of publication, distribution, etc. 2005.
300 ## - PHYSICAL DESCRIPTION
Extent 365 p.
Dimensions 24 cm.
520 ## - SUMMARY, ETC.
Summary, etc. Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay. You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. You'll learn to do just that with this book's assessments of the risks, rewards, and trade-offs related implementing security measures. + Helps you see through a hacker's eyes so you can make your network more secure. + Provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, encryption, anti-virus software, and digital certificates. + Emphasizes a wide range of administrative considerations, including security policies, user management, and control of services and devices. + Covers techniques for enhancing the physical security of your systems and network. + Explains how hackers use information-gathering to find and exploit security flaws. + Examines the most effective ways to prevent hackers from gaining root access to a server. + Addresses Denial of Service attacks, "malware," and spoofing. + Includes appendices covering the TCP/IP protocol stack, well-known ports, and reliable sources for security warnings and updates.
830 #4 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title The morgan kaufmann series in networking.
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified Amazon.com
Uniform Resource Identifier <a href="http://www.amazon.com/exec/obidos/ASIN/0123116333/chopaconline-20">http://www.amazon.com/exec/obidos/ASIN/0123116333/chopaconline-20</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Inventory number Total Checkouts Full call number Barcode Date last seen Date last checked out Price effective from Koha item type
    Dewey Decimal Classification     Computer Science Air University Kamra Campus Library Air University Kamra Campus Library Computer Science 03/05/2020 Progressive 8051.35 10230167 2 005.8 HAR AUKP2104 07/03/2023 11/18/2020 03/05/2020 Book
Air University Sector E-9, Islamabad Pakistan
Email: librarian@au.edu.pk  Tel : +0092 51 9262612 Ext: 631