Welcome to UE Central Library

Keep Smiling

Network security : (Record no. 16556)

MARC details
000 -LEADER
fixed length control field 01133cam a22002177a 4500
001 - CONTROL NUMBER
control field 12505023
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200901102415.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 010816s2001 cau 000 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0072133244
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780072133240
040 ## - CATALOGING SOURCE
Transcribing agency UKM
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 21
Item number M2328
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Maiwald, Eric.
245 10 - TITLE STATEMENT
Title Network security :
Remainder of title a beginner's guide
Statement of responsibility, etc / Eric Maiwald.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New York :
Name of publisher, distributor, etc Osborne/McGraw-Hill,
Date of publication, distribution, etc 2001
300 ## - PHYSICAL DESCRIPTION
Extent xxix, 400 p. :
Other physical details ill. ;
Dimensions 24 cm.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Part I: Network Security Overview <br/>1. Network security primer <br/>2. Types of attacks <br/>3. Information security services <br/>Part II: Ground Work for Building a Security Program <br/>1. Legal issues<br/>2. Policy <br/>3. Risk assessment <br/>4. Process <br/>5. Security best practices <br/>Part III: Technical Implementation <br/>1. Internet architecture <br/>2. Ecommerce security needs <br/>3. Encryption <br/>4. Hacker techniques <br/>5. Intrusion detection <br/>Part IV: Securing Operating Systems <br/>1. Windows 2000 <br/>2. Windows nt <br/>3. Unix/linux <br/>4. Novell netware<br/>
Holdings
Withdrawn status Damaged status Not for loan Home library Current library Date acquired Source of acquisition Full call number Barcode Date last seen Price effective from Koha item type
      UE-Central Library UE-Central Library 03.12.2018 U.E.24141 005.8 M2328 T9687 20.02.2019 03.12.2018 Books
Copyright © 2023, University of Education, Lahore. All Rights Reserved.
Email:centrallibrary@ue.edu.pk