Network security bible (Record no. 11807)

MARC details
000 -LEADER
fixed length control field 01974pam a22002534a 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 0764573977
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9780764573972
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
Item number COL
100 1# - MAIN ENTRY--AUTHOR NAME
Personal name Cole, Eric.
245 10 - TITLE STATEMENT
Title Network security bible
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Indianapolis, IN :
Name of publisher Wiley Pub.,
Year of publication c2005.
300 ## - PHYSICAL DESCRIPTION
Number of Pages xxxiv, 660 p. :
Other physical details illustrations ;
500 ## - GENERAL NOTE
General note Includes index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Information system security principles --<br/>Information system security management --<br/>Access control considerations --<br/>Windows security --<br/>UNIX and Linux security --<br/>Web browser and client security --<br/>Web security --<br/>E-mail security --<br/>Domain name system --<br/>Server security --<br/>Network protocols --<br/>Wireless security --<br/>Network architecture fundamentals --<br/>Secret communication --<br/>Covert communication --<br/>Applications of secure/covert communication --<br/>Intrusion detection and response --<br/>Security assessments, testing, and evaluation--<br/>Putting everything together.
520 ## - SUMMARY, ETC.
Summary, etc A must for working network and security professionals as well as anyone in IS seeking to build competence in the increasingly important field of securtiy. Written by three high-profile experts, including Eric Cole, an ex-CIA security guru who appears regularly on CNN and elsewhere in the media, and Ronald Krutz, a security pioneer who co-wrote The CISSP Prep Guide and other security bestsellers. Covers everything from basic security principles and practices to the latest security threats and responses, including proven methods for diagnosing network vulnerabilities and insider secrets for boosting security effectiveness.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer networks
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Krutz, Ronald L.,
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Conley, James W.
856 41 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://www.loc.gov/catdir/toc/ecip053/2004025696.html
856 42 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://www.loc.gov/catdir/enhancements/fy0617/2004025696-b.html
856 42 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://www.loc.gov/catdir/enhancements/fy0617/2004025696-d.html
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Reference Books
Holdings
Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Full call number Accession Number Koha item type
Reference Main Library Main Library Reference 23/10/2009 Donation 4598.85 005.82 COL 011619 Reference Books

© University of Vavuniya

---