Extrusion detection : (Record no. 48928)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01296cam a22002654a 4500 |
001 - CONTROL NUMBER | |
control field | 14113656 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | 0 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20170223093414.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 050920s2006 njua b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
LC control number | 2005027490 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0321349962 (pbk. : alk. paper) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780321349965 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | SPU |
050 00 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK 5105.59 |
Item number | .B43 2006 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Bejtlich, Richard. |
245 10 - TITLE STATEMENT | |
Title | Extrusion detection : |
Remainder of title | security monitoring for internal intrusions / |
Statement of responsibility, etc | Richard Bejtlich. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | Upper Saddle River, NJ : |
Name of publisher, distributor, etc | Addison-Wesley, |
Date of publication, distribution, etc | 2006. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxviii, 385 p. : |
Other physical details | ill. ; |
Dimensions | 24 cm. |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Detecting and controlling intrusions -- Network security monitoring revisited -- Defensible network architecture -- Extrusion detection illustrated -- Enterprise network instrumentation -- Layer 3 network access control -- Network security operations -- Traffic threat assessment -- Network incident response -- Network forensics -- Internal intrusions -- Traffic threat assessment case study -- Malicious bots. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Electronic countermeasures. |
856 41 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | Table of contents only |
Uniform Resource Identifier | <a href="http://www.loc.gov/catdir/toc/ecip061/2005027490.html">http://www.loc.gov/catdir/toc/ecip061/2005027490.html</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | Book |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Total Checkouts | Full call number | Barcode | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Library of Congress Classification | Non-fiction | Nakuru Campus | Nakuru Campus | General Circulation | 23/02/2017 | Donation-BFA | 1000.00 | TK 5105.59 .B43 2006 | 051083 | 1 | 23/02/2017 | Book |