Application of .Net technology / (Record no. 1137)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01446nam a22002057a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OSt |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20140214114959.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 130724t20122011ii.ill.g |||| 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780071072755 (pbk) |
040 ## - CATALOGING SOURCE | |
Transcribing agency | NCL |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Item number | APP 2012 4281 |
245 1# - TITLE STATEMENT | |
Title | Application of .Net technology / |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc. | New Delhi : |
Name of publisher, distributor, etc. | Mcgraw, |
Date of publication, distribution, etc. | 2011c. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 235 p. : |
Other physical details | ill. ; |
Dimensions | 25 cm. |
500 ## - GENERAL NOTE | |
General note | Index included |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Preface Introduction Part I -Security Fundamentals Chapter 1 - Security is the Result of Risk Assessment & Management Chapter 2 - Properties of a Good Network Environment Chapter 3 - Computer Security Fundamentals Part II -The Threats Chapter 4 - What are the Threats to Network Security? Chapter 5 - Techniques & Technology for Security Management Chapter 6 - Managing System Protection Chapter 7 - Cryptography and Its Applications Chapter 8 - Wireless Security Part III - The Management & Policy Side of Security Chapter 9 - Disaster Planning: Preparation, Response & Recovery Chapter 10 - Network Design & Project Management Chapter 11 - Security Management Chapter 12 - Legal & Ethical Issues Acronyms List Glossary Index |
520 ## - SUMMARY, ETC. | |
Summary, etc. | For undergraduate and graduate network security courses. This book aims to provide comprehensive knowledge of network security to students without a technical background who will need this |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Security measures. |
9 (RLIN) | 1007 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type | Source of acquisition | Inventory number |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Namal Library | Namal Library | Computer Science | 07/24/2013 | 005.8 CAR-M 2012 1561 | 1561 | 07/24/2013 | 07/24/2013 | Books | ||||||||
Namal Library | Namal Library | Computer Science | 01/23/2014 | 005.8 APP 2012 4281 | 0004281 | 01/23/2014 | 01/23/2014 | Books | allied book company | Bill No. 2984 |