MARC details
| 000 -LEADER |
| fixed length control field |
01906cam a22003377i 4500 |
| 001 - CONTROL NUMBER |
| control field |
14997669 |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20200907145137.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
070907s2008 njua 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2007299212 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9780470101926 (pbk.) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
047010192X (pbk.) |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
EG-NcFUE |
| Description conventions |
rda |
| Transcribing agency |
EG-NcFUE |
| Modifying agency |
EG-NcFUE |
| Language of cataloging |
eng |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Edition number |
22 |
| Item number |
N |
| 245 00 - TITLE STATEMENT |
| Title |
Network security fundamentals / |
| Statement of responsibility, etc |
Eric Cole ... [and others]. |
| 264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc |
Hoboken, N.J. : |
| Name of publisher, distributor, etc |
Wiley ; |
| Date of publication, distribution, etc |
[2008] |
| 264 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Date of publication, distribution, etc |
© 2008 |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xxviii, 524 pages : |
| Other physical details |
illustrations ; |
| Dimensions |
24 cm. |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Content type code |
txt |
| Source |
rdacontent |
| 337 ## - MEDIA TYPE |
| Media type term |
unmediated |
| Media type code |
n |
| Source |
rdamedia |
| 338 ## - CARRIER TYPE |
| Carrier type term |
volume |
| Carrier type code |
nc |
| Source |
rdacarrier |
| 500 ## - GENERAL NOTE |
| General note |
Includes index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
1. Computer and Network Security Principles. 2. Network and Server Security. 3. Cryptography. 4. Authentication. 5. Authorization and Access Control. 6. Securing Network Transmission. 7. Remote Access and Wireless Security. 8. Server Roles and Security. 9. Protecting Against Malware. 10. Ongoing Security Management. 11. Fault Tolerance and Disaster Recovery. 12. Intrusion Detection and Response. Glossary. Index. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc |
As networks around the world have become more and more connected, an understanding of network security has become an integral part of a network administrator's job. People who design, implement, and manage networks on a day-to-day basis must understand the threats that exist and how to mitigate them to protect a company's assets. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer networks |
| General subdivision |
Security measures. |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| 9 (RLIN) |
33740 |
| Personal name |
Cole, Eric |
| 856 42 - ELECTRONIC LOCATION AND ACCESS |
| Materials specified |
Publisher description |
| Uniform Resource Identifier |
<a href="http://www.loc.gov/catdir/enhancements/fy0745/2007299212-d.html">http://www.loc.gov/catdir/enhancements/fy0745/2007299212-d.html</a> |
| 856 41 - ELECTRONIC LOCATION AND ACCESS |
| Materials specified |
Table of contents only |
| Uniform Resource Identifier |
<a href="http://www.loc.gov/catdir/enhancements/fy0745/2007299212-t.html">http://www.loc.gov/catdir/enhancements/fy0745/2007299212-t.html</a> |
| 856 41 - ELECTRONIC LOCATION AND ACCESS |
| Materials specified |
Abstract |
| Uniform Resource Identifier |
<a href="http://repository.fue.edu.eg/xmlui/handle/123456789/3570">http://repository.fue.edu.eg/xmlui/handle/123456789/3570</a> |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Koha item type |
Books |
| Source of classification or shelving scheme |
Dewey Decimal Classification |