Fundamentals of network security (Record no. 12050)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01320cam a2200217 a 4500 |
001 - CONTROL NUMBER | |
control field | 13598924 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200826104233.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 040519s2004 nyua 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0072230932 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780071070935 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | LPU |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 22 |
Item number | M2328 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Maiwald, Eric. |
245 10 - TITLE STATEMENT | |
Title | Fundamentals of network security |
Statement of responsibility, etc | / Eric Maiwald. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | New Delhi : |
Name of publisher, distributor, etc | Tata McGraw-Hill, |
Date of publication, distribution, etc | 2010 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxvi, 645 p. : |
Other physical details | ill. ; |
Dimensions | 24 cm. |
500 ## - GENERAL NOTE | |
General note | Includes index. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Security measures. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Books |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Part I: Information Security Basics <br/>1. What is information security? <br/>2. Types of attacks <br/>3. Hacker techniques <br/>4. Information security services <br/>Part II: Groundwork <br/>1. Legal issues in information security <br/>2. Policy <br/>3. Managing risk <br/>4. Information security process <br/>5. Information security best practices <br/>Part III: Security Technologies <br/>1. Firewalls <br/>2. Virtual private networks <br/>3. Encryption <br/>4. Intrusion detection <br/>Part IV: Practical Applications and Platform-Specific Implementations <br/>1. Desktop protection <br/>2. Unix security issues <br/>3. Windows nt security issues <br/>4. Windows 2000/ windows 2003 server security issues <br/>5. Internet architecture <br/>6. E-commerce security needs <br/>7. Wireless security<br/> |
Withdrawn status | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|
UE-Central Library | UE-Central Library | 12.11.2018 | U.E.23880 | 005.8 M2328 | T9362 | 12.11.2018 | 12.11.2018 | Books |