Active defense : (E-BOOK) (Record no. 191175)

000 -LEADER
fixed length control field 01505 a2200229 4500
003 - CONTROL NUMBER IDENTIFIER
control field Nust
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20170207154010.0
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2001088118
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0782129161
040 ## - CATALOGING SOURCE
Transcribing agency Nust
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Brenton, Chris.
245 10 - TITLE STATEMENT
Title Active defense : (E-BOOK)
Remainder of title a comprehensive guide to network security /
Statement of responsibility, etc. Chris Brenton with Cameron Hunt.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. San Francisco :
Name of publisher, distributor, etc. Sybex,
Date of publication, distribution, etc. c2001.
300 ## - PHYSICAL DESCRIPTION
Extent xxvii, 723 p. :
Other physical details ill. ;
Dimensions 23 cm. +
Accompanying material 1 CD-ROM (4 3/4 in.)
500 ## - GENERAL NOTE
General note Includes index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1 - Why Secure Your Network? – 8 Chapter 2 - How Much Security Do You Need? – 14 Chapter 3 - Understanding How Network Systems Communicate – 27 Chapter 4 - Topology Security – 62 Chapter 5 - Firewalls – 81 Chapter 6 - Configuring Cisco Router Security Features – 116 Chapter 7 - Check Point’s FireWall-1 – 143 Chapter 8 - Intrusion Detection Systems – 168 Chapter 9 - Authentication and Encryption – 187 Chapter 10 - Virtual Private Networking – 202 Chapter 11 - Viruses, Trojans, and Worms: Oh My! – 218 Chapter 12 - Disaster Prevention and Recovery – 233 Chapter 13 - NetWare – 256 Chapter 14 - NT and Windows 2000 – 273 Chapter 15 - UNIX – 309 Chapter 16 - The Anatomy of an Attack – 334 Chapter 17 - Staying Ahead of Attacks - 352
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME
Geographic name E-BOOK
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Hunt, Cameron.
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Publisher description
Uniform Resource Identifier <a href="http://www.loc.gov/catdir/enhancements/fy0611/2001088118-d.html">http://www.loc.gov/catdir/enhancements/fy0611/2001088118-d.html</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Permanent Location Current Location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
            Military College of Signals (MCS) Military College of Signals (MCS) 12/12/2016   005.8 CHR MCSEB-620 12/08/2016 12/12/2016 Book
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.