Network security first-step / (Record no. 480)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01453nam a22002177a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | LSCPL |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20191209113028.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 130410t2012 ii.ill.g |||| 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9788131787014 (pbk) |
040 ## - CATALOGING SOURCE | |
Transcribing agency | NCL |
Modifying agency | LIN2019 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 004.6 |
Item number | THO-N 2012 710 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Thomas, Tom |
9 (RLIN) | 1005 |
245 1# - TITLE STATEMENT | |
Title | Network security first-step / |
Statement of responsibility, etc. | by Tom Thomas and Donald Stoddard |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc. | New Delhi : |
Name of publisher, distributor, etc. | Pearson Education Private Limited, |
Date of publication, distribution, etc. | 2012 c. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxiv, 423 p. : |
Other physical details | ill. ; |
Dimensions | 24 cm. |
440 ## - SERIES STATEMENT/ADDED ENTRY--TITLE | |
Title | First-Step Series |
9 (RLIN) | 1006 |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Chapter 1: There be Hackers here-------------------------------<br/>Chapter 2: Security Policies-------------------------------<br/>Chapter 3: Processes and Procedures-------------------------<br/>Chapter 4: Network Security Standards and Guidelines-------------------------<br/>Chapter 5: Overview of Security Technologies----------------------------<br/>Chapter 6: Security Protocols-----------------------------<br/>Chapter 7: Firewalls----------------------------<br/>Chapter 8: Router Security---------------------------<br/>Chapter 9: IPsec Virtual Private Networks (VPNs)----------------------------<br/>Chapter 10: Wireless Security-------------------------------<br/>Chapter 11: Intrusion Detection and Honeypots----------------------------<br/>Chapter 12: Tools of the Trade----------------------------- |
650 0# - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Security measures |
9 (RLIN) | 1007 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Stoddard, Donald |
9 (RLIN) | 1008 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Inventory number | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Namal Library | Namal Library | Computer Science | 04/10/2013 | Allied Book Company | 423.75 | Bill No. 1415 | 004.6 THO-N 2012 710 | 710 | 07/18/2013 | 07/18/2013 | Books |