000 -LEADER |
fixed length control field |
02840cam a22004337a 4500 |
001 - CONTROL NUMBER |
control field |
15861242 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
APU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20160223051503.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
090810s2010 nyua b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2009934522 |
015 ## - NATIONAL BIBLIOGRAPHY NUMBER |
National bibliography number |
GBA8C6117 |
Source |
bnb |
015 ## - NATIONAL BIBLIOGRAPHY NUMBER |
National bibliography number |
990523004 |
Source |
dnb |
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER |
Record control number |
014794000 |
Source |
Uk |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780387887708 (hbk.) |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)ocn473398208 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
UKM |
Transcribing agency |
UKM |
Modifying agency |
NEDA |
-- |
ANA |
Language of cataloging |
eng |
042 ## - AUTHENTICATION CODE |
Authentication code |
ukblcatcopy |
-- |
lccopycat |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5105.59 |
Item number |
.G46 2010 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
22 |
Item number |
GHO 2010 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Ghorbani, Ali A, |
Dates associated with a name |
1954- |
9 (RLIN) |
11434 |
245 10 - TITLE STATEMENT |
Title |
Network intrusion detection and prevention : |
Remainder of title |
concepts and techniques / |
Statement of responsibility, etc |
Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
New York : |
Name of publisher, distributor, etc |
Springer, |
Date of publication, distribution, etc |
c2010. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xviii, 212 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm. |
490 1# - SERIES STATEMENT |
Series statement |
Advances in information security ; |
Volume number/sequential designation |
ADIS 47 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Network Attacks. -- Detection Approaches. -- Data Collection. -- Theoretical Foundation Of Detection. -- Architecture and Implementation. -- Alert Management and Correlation. -- Evaluation Criteria. -- Intrusion Response. -- Examples of Commercial and Open Source IDSs |
520 ## - SUMMARY, ETC. |
Summary, etc |
Intrusion Detection and Prevention is a rapidly growing field that deals with detecting and responding to malicious network traffic and computer misuse. Intrusion detection is the process of identifying and (possibly) responding to malicious activities targeted at computing and network resources. Any hardware or software automation that monitors, detects or responds to events occurring in a network or on a host computer is considered relevant to the intrusion detection approach. Different intrusion detection systems provide varying functionalities and benefits. Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response. Additionally, it provides an overview of some of the commercially/publicly available intrusion detection and response systems--Cover. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Intrusion detection systems (Computer security) |
9 (RLIN) |
11277 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Intrusion detection systems (Computer security) |
Form subdivision |
Case studies. |
9 (RLIN) |
11435 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures. |
9 (RLIN) |
77 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures |
Form subdivision |
Case studies. |
9 (RLIN) |
11436 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Lu, Wei, |
Dates associated with a name |
1980- |
9 (RLIN) |
11437 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Tavallaee, Mahbod. |
9 (RLIN) |
11438 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Advances in information security |
9 (RLIN) |
11439 |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
copycat |
d |
2 |
e |
ncip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
Book |
Koha issues (borrowed), all copies |
4 |