Network security bible (Record no. 11807)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01974pam a22002534a 4500 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 0764573977 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9780764573972 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.82 |
Item number | COL |
100 1# - MAIN ENTRY--AUTHOR NAME | |
Personal name | Cole, Eric. |
245 10 - TITLE STATEMENT | |
Title | Network security bible |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication | Indianapolis, IN : |
Name of publisher | Wiley Pub., |
Year of publication | c2005. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | xxxiv, 660 p. : |
Other physical details | illustrations ; |
500 ## - GENERAL NOTE | |
General note | Includes index. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Information system security principles --<br/>Information system security management --<br/>Access control considerations --<br/>Windows security --<br/>UNIX and Linux security --<br/>Web browser and client security --<br/>Web security --<br/>E-mail security --<br/>Domain name system --<br/>Server security --<br/>Network protocols --<br/>Wireless security --<br/>Network architecture fundamentals --<br/>Secret communication --<br/>Covert communication --<br/>Applications of secure/covert communication --<br/>Intrusion detection and response --<br/>Security assessments, testing, and evaluation--<br/>Putting everything together. |
520 ## - SUMMARY, ETC. | |
Summary, etc | A must for working network and security professionals as well as anyone in IS seeking to build competence in the increasingly important field of securtiy. Written by three high-profile experts, including Eric Cole, an ex-CIA security guru who appears regularly on CNN and elsewhere in the media, and Ronald Krutz, a security pioneer who co-wrote The CISSP Prep Guide and other security bestsellers. Covers everything from basic security principles and practices to the latest security threats and responses, including proven methods for diagnosing network vulnerabilities and insider secrets for boosting security effectiveness. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computer networks |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Krutz, Ronald L., |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Conley, James W. |
856 41 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://www.loc.gov/catdir/toc/ecip053/2004025696.html |
856 42 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://www.loc.gov/catdir/enhancements/fy0617/2004025696-b.html |
856 42 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://www.loc.gov/catdir/enhancements/fy0617/2004025696-d.html |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Reference Books |
Collection code | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Full call number | Accession Number | Koha item type |
---|---|---|---|---|---|---|---|---|---|
Reference | Main Library | Main Library | Reference | 23/10/2009 | Donation | 4598.85 | 005.82 COL | 011619 | Reference Books |