Network intrusion detection and prevention (Record no. 32532)

000 -LEADER
fixed length control field 03072cam a22004817a 4500
001 - CONTROL NUMBER
control field 7867707
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210827105218.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr n
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 090126s2010 nyua sb 001 0 eng d
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBA8C6117
Source bnb
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number 990523004
Source dnb
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 014794000
Source Uk
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780387887708 (alk. paper)
035 ## - SYSTEM CONTROL NUMBER
System control number (WaSeSS)ssj0000325088
038 ## - RECORD CONTENT LICENSOR
Staff Name khadija
040 ## - CATALOGING SOURCE
Original cataloging agency UKM
Transcribing agency UKM
Modifying agency CDX
-- YDXCP
-- GBVCP
-- VCV
-- CTB
-- WAU
-- LHU
-- NJI
-- DLC
-- WaSeSS
042 ## - AUTHENTICATION CODE
Authentication code ukblcatcopy
-- lccopycat
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .G63 2010
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
Author Mark GHO
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Ghorbani, A. Ali
Dates associated with a name 1954-
9 (RLIN) 81727
210 10 - ABBREVIATED TITLE
Abbreviated title Network intrusion detection and prevention
245 10 - TITLE STATEMENT
Title Network intrusion detection and prevention
Remainder of title concepts and techniques /
Statement of responsibility, etc. Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New York :
Name of publisher, distributor, etc. Springer,
Date of publication, distribution, etc. c2010.
490 1# - SERIES STATEMENT
Series statement Advances in information security ;
Volume/sequential designation ADIS 47
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Network Attacks. -- Detection Approaches. -- Data Collection. -- Theoretical Foundation Of Detection. -- Architecture and Implementation. -- Alert Management and Correlation. -- Evaluation Criteria. -- Intrusion Response. -- Examples of Commercial and Open Source IDSs
506 ## - RESTRICTIONS ON ACCESS NOTE
Terms governing access License restrictions may limit access.
520 ## - SUMMARY, ETC.
Summary, etc. Intrusion Detection and Prevention is a rapidly growing field that deals with detecting and responding to malicious network traffic and computer misuse. Intrusion detection is the process of identifying and (possibly) responding to malicious activities targeted at computing and network resources. Any hardware or software automation that monitors, detects or responds to events occurring in a network or on a host computer is considered relevant to the intrusion detection approach. Different intrusion detection systems provide varying functionalities and benefits. Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response. Additionally, it provides an overview of some of the commercially/publicly available intrusion detection and response systems--Cover.
563 ## - BINDING INFORMATION
Binding note hard cover
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Intrusion detection systems (Computer security)
9 (RLIN) 6106
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Intrusion detection systems (Computer security)
Form subdivision Case studies.
9 (RLIN) 81728
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
9 (RLIN) 466
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures
Form subdivision Case studies.
9 (RLIN) 81729
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Lu, Wei,
Dates associated with a name 1980-
9 (RLIN) 81730
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Tavallaee, Mahbod.
9 (RLIN) 81731
773 #0 - HOST ITEM ENTRY
Title SpringerLink ebooks - Computer Science (2010)
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Advances in information security
9 (RLIN) 81732
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://www.columbia.edu/cgi-bin/cul/resolve?clio7867707">http://www.columbia.edu/cgi-bin/cul/resolve?clio7867707</a>
Public note Full text available from SpringerLink ebooks - Computer Science (2010)
910 ## - USER-OPTION DATA (OCLC)
User-option data Library of Congress record
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Full call number Barcode Date last seen Price effective from Koha item type Public note
          School of Mechanical & Manufacturing Engineering (SMME) School of Mechanical & Manufacturing Engineering (SMME) General Stacks 10/01/2015 005.8 GHO SMME-1283 03/28/2018 10/01/2015 Book Rack,51-Shelf,3
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.