Network Security: (Record no. 24106)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02377nam a2200217 a 4500 |
| 001 - CONTROL NUMBER | |
| control field | ASIN0123116333 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | AUCL |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20200305093150.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 111101s2005 xxu eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9780123116338 |
| 040 ## - CATALOGING SOURCE | |
| Transcribing agency | AUKP |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 HAR |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Harrington, Jan L. |
| 245 10 - TITLE STATEMENT | |
| Title | Network Security: |
| Remainder of title | A Practical Approach |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Bostan. |
| Name of publisher, distributor, etc. | Elsevier |
| Date of publication, distribution, etc. | 2005. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 365 p. |
| Dimensions | 24 cm. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay. You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. You'll learn to do just that with this book's assessments of the risks, rewards, and trade-offs related implementing security measures. + Helps you see through a hacker's eyes so you can make your network more secure. + Provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, encryption, anti-virus software, and digital certificates. + Emphasizes a wide range of administrative considerations, including security policies, user management, and control of services and devices. + Covers techniques for enhancing the physical security of your systems and network. + Explains how hackers use information-gathering to find and exploit security flaws. + Examines the most effective ways to prevent hackers from gaining root access to a server. + Addresses Denial of Service attacks, "malware," and spoofing. + Includes appendices covering the TCP/IP protocol stack, well-known ports, and reliable sources for security warnings and updates. |
| 830 #4 - SERIES ADDED ENTRY--UNIFORM TITLE | |
| Uniform title | The morgan kaufmann series in networking. |
| 856 40 - ELECTRONIC LOCATION AND ACCESS | |
| Materials specified | Amazon.com |
| Uniform Resource Identifier | <a href="http://www.amazon.com/exec/obidos/ASIN/0123116333/chopaconline-20">http://www.amazon.com/exec/obidos/ASIN/0123116333/chopaconline-20</a> |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | Book |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Inventory number | Total Checkouts | Full call number | Barcode | Date last seen | Date last checked out | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Computer Science | Air University Kamra Campus Library | Air University Kamra Campus Library | Computer Science | 03/05/2020 | Progressive | 8051.35 | 10230167 | 2 | 005.8 HAR | AUKP2104 | 07/03/2023 | 11/18/2020 | 03/05/2020 | Book |