MARC details
| 000 -LEADER |
| fixed length control field |
03628cam a2200361 i 4500 |
| 001 - CONTROL NUMBER |
| control field |
793224635 |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20210427114547.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
130927s2014 flua b 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2013039508 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781466564121 (hardcover : alk. paper) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
1466564121 (hardcover : alk. paper) |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
DLC |
| Language of cataloging |
eng |
| Description conventions |
rda |
| Transcribing agency |
DLC |
| Modifying agency |
YDX |
| -- |
BTCTA |
| -- |
YDXCP |
| -- |
OCLCF |
| -- |
UtOrBLW |
| 042 ## - AUTHENTICATION CODE |
| Authentication code |
pcc |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
QA76.9.A25 |
| Item number |
F85 2014 |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Edition number |
23 |
| Item number |
F.C.I |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Fung, Carol, |
| Relator term |
author. |
| 245 10 - TITLE STATEMENT |
| Title |
Intrusion detection networks : |
| Remainder of title |
a key to collaborative security / |
| Statement of responsibility, etc |
Carol Fung and Raouf Boutaba. |
| 264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc |
Boca Raton : |
| Name of publisher, distributor, etc |
CRC Press, |
| Date of publication, distribution, etc |
[2014] |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xxii, 239 pages ; |
| Dimensions |
24 cm. |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Source |
rdacontent. |
| 337 ## - MEDIA TYPE |
| Media type term |
unmediated |
| Source |
rdamedia. |
| 338 ## - CARRIER TYPE |
| Carrier type term |
volume |
| Source |
rdacarrier. |
| 500 ## - GENERAL NOTE |
| General note |
computer bookfair2015 |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc |
Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Front Cover<br/>Contents (1/2)<br/>Contents (2/2)<br/>List of Figures<br/>List of Tables<br/>Preface<br/>About the Authors<br/>SECTION I: INTRODUCTION (1/2)<br/>SECTION I: INTRODUCTION (2/2)<br/>SECTION II: CYBER INTRUSIONS AND INTRUSION DETECTION<br/>2. Cyber Intrusions (1/3)<br/>2. Cyber Intrusions (2/3)<br/>2. Cyber Intrusions (3/3)<br/>3. Intrusion Detection (1/4)<br/>3. Intrusion Detection (2/4)<br/>3. Intrusion Detection (3/4)<br/>3. Intrusion Detection (4/4)<br/>SECTION III: DESIGN OF AN INTRUSION DETECTION NETWORK<br/>4. Collaborative Intrusion Detection Networks Architecture Design (1/2)<br/>4. Collaborative Intrusion Detection Networks Architecture Design (2/2)<br/>5. Trust Management (1/5)<br/>5. Trust Management (2/5)<br/>5. Trust Management (3/5)<br/>5. Trust Management (4/5)<br/>5. Trust Management (5/5)<br/>6. Collaborative Decision (1/5)<br/>6. Collaborative Decision (2/5)<br/>6. Collaborative Decision (3/5)<br/>6. Collaborative Decision (4/5)<br/>6. Collaborative Decision (5/5)<br/>7. Resource Management (1/5)<br/>7. Resource Management (2/5)<br/>7. Resource Management (3/5)<br/>7. Resource Management (4/5)<br/>7. Resource Management (5/5)<br/>8. Collaborators Selection and Management (1/6)<br/>8. Collaborators Selection and Management (2/6)<br/>8. Collaborators Selection and Management (3/6)<br/>8. Collaborators Selection and Management (4/6)<br/>8. Collaborators Selection and Management (5/6)<br/>8. Collaborators Selection and Management (6/6)<br/>SECTION IV: OTHER TYPES OF IDN DESIGN<br/>9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (1/7)<br/>9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (2/7)<br/>9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (3/7)<br/>9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (4/7)<br/>9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (5/7)<br/>9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (6/7)<br/>9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (7/7)<br/>10. Collaborative Malware Detection Networks (1/6)<br/>10. Collaborative Malware Detection Networks (2/6)<br/>10. Collaborative Malware Detection Networks (3/6)<br/>10. Collaborative Malware Detection Networks (4/6)<br/>10. Collaborative Malware Detection Networks (5/6)<br/>10. Collaborative Malware Detection Networks (6/6)<br/>SECTION V: CONCLUSION<br/>SECTION VI: APPENDICES<br/>A. Examples of Intrusion Detection Rules and Alerts<br/>B. Proofs of Theorems |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computers |
| General subdivision |
Access control. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer networks |
| General subdivision |
Security measures. |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Boutaba, Raouf, |
| Relator term |
author. |
| 856 41 - ELECTRONIC LOCATION AND ACCESS |
| Materials specified |
Abstract |
| Uniform Resource Identifier |
<a href="http://repository.fue.edu.eg/xmlui/handle/123456789/3611">http://repository.fue.edu.eg/xmlui/handle/123456789/3611</a> |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Dewey Decimal Classification |
| Koha item type |
Books |