Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--

Intrusion detection networks : (Record no. 9096)

MARC details
000 -LEADER
fixed length control field 03628cam a2200361 i 4500
001 - CONTROL NUMBER
control field 793224635
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210427114547.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 130927s2014 flua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2013039508
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781466564121 (hardcover : alk. paper)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1466564121 (hardcover : alk. paper)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions rda
Transcribing agency DLC
Modifying agency YDX
-- BTCTA
-- YDXCP
-- OCLCF
-- UtOrBLW
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number F85 2014
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
Item number F.C.I
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Fung, Carol,
Relator term author.
245 10 - TITLE STATEMENT
Title Intrusion detection networks :
Remainder of title a key to collaborative security /
Statement of responsibility, etc Carol Fung and Raouf Boutaba.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Boca Raton :
Name of publisher, distributor, etc CRC Press,
Date of publication, distribution, etc [2014]
300 ## - PHYSICAL DESCRIPTION
Extent xxii, 239 pages ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Content type term text
Source rdacontent.
337 ## - MEDIA TYPE
Media type term unmediated
Source rdamedia.
338 ## - CARRIER TYPE
Carrier type term volume
Source rdacarrier.
500 ## - GENERAL NOTE
General note computer bookfair2015
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Front Cover<br/>Contents (1/2)<br/>Contents (2/2)<br/>List of Figures<br/>List of Tables<br/>Preface<br/>About the Authors<br/>SECTION I: INTRODUCTION (1/2)<br/>SECTION I: INTRODUCTION (2/2)<br/>SECTION II: CYBER INTRUSIONS AND INTRUSION DETECTION<br/>2. Cyber Intrusions (1/3)<br/>2. Cyber Intrusions (2/3)<br/>2. Cyber Intrusions (3/3)<br/>3. Intrusion Detection (1/4)<br/>3. Intrusion Detection (2/4)<br/>3. Intrusion Detection (3/4)<br/>3. Intrusion Detection (4/4)<br/>SECTION III: DESIGN OF AN INTRUSION DETECTION NETWORK<br/>4. Collaborative Intrusion Detection Networks Architecture Design (1/2)<br/>4. Collaborative Intrusion Detection Networks Architecture Design (2/2)<br/>5. Trust Management (1/5)<br/>5. Trust Management (2/5)<br/>5. Trust Management (3/5)<br/>5. Trust Management (4/5)<br/>5. Trust Management (5/5)<br/>6. Collaborative Decision (1/5)<br/>6. Collaborative Decision (2/5)<br/>6. Collaborative Decision (3/5)<br/>6. Collaborative Decision (4/5)<br/>6. Collaborative Decision (5/5)<br/>7. Resource Management (1/5)<br/>7. Resource Management (2/5)<br/>7. Resource Management (3/5)<br/>7. Resource Management (4/5)<br/>7. Resource Management (5/5)<br/>8. Collaborators Selection and Management (1/6)<br/>8. Collaborators Selection and Management (2/6)<br/>8. Collaborators Selection and Management (3/6)<br/>8. Collaborators Selection and Management (4/6)<br/>8. Collaborators Selection and Management (5/6)<br/>8. Collaborators Selection and Management (6/6)<br/>SECTION IV: OTHER TYPES OF IDN DESIGN<br/>9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (1/7)<br/>9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (2/7)<br/>9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (3/7)<br/>9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (4/7)<br/>9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (5/7)<br/>9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (6/7)<br/>9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (7/7)<br/>10. Collaborative Malware Detection Networks (1/6)<br/>10. Collaborative Malware Detection Networks (2/6)<br/>10. Collaborative Malware Detection Networks (3/6)<br/>10. Collaborative Malware Detection Networks (4/6)<br/>10. Collaborative Malware Detection Networks (5/6)<br/>10. Collaborative Malware Detection Networks (6/6)<br/>SECTION V: CONCLUSION<br/>SECTION VI: APPENDICES<br/>A. Examples of Intrusion Detection Rules and Alerts<br/>B. Proofs of Theorems
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computers
General subdivision Access control.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Boutaba, Raouf,
Relator term author.
856 41 - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract
Uniform Resource Identifier <a href="http://repository.fue.edu.eg/xmlui/handle/123456789/3611">http://repository.fue.edu.eg/xmlui/handle/123456789/3611</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Acquisition method Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
  Dewey Decimal Classification       Main library Main library A2 09/02/2015 Academic bookshop 924.00 Purchase   005.8 F.C.I 00011640 19/02/2025 09/02/2015 Books