Asia Pacific University Library catalogue


Network intrusion detection and prevention : (Record no. 6166)

000 -LEADER
fixed length control field 02840cam a22004337a 4500
001 - CONTROL NUMBER
control field 15861242
003 - CONTROL NUMBER IDENTIFIER
control field APU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20160223051503.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 090810s2010 nyua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2009934522
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBA8C6117
Source bnb
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number 990523004
Source dnb
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 014794000
Source Uk
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780387887708 (hbk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn473398208
040 ## - CATALOGING SOURCE
Original cataloging agency UKM
Transcribing agency UKM
Modifying agency NEDA
-- ANA
Language of cataloging eng
042 ## - AUTHENTICATION CODE
Authentication code ukblcatcopy
-- lccopycat
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .G46 2010
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
Item number GHO 2010
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Ghorbani, Ali A,
Dates associated with a name 1954-
9 (RLIN) 11434
245 10 - TITLE STATEMENT
Title Network intrusion detection and prevention :
Remainder of title concepts and techniques /
Statement of responsibility, etc Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New York :
Name of publisher, distributor, etc Springer,
Date of publication, distribution, etc c2010.
300 ## - PHYSICAL DESCRIPTION
Extent xviii, 212 p. :
Other physical details ill. ;
Dimensions 24 cm.
490 1# - SERIES STATEMENT
Series statement Advances in information security ;
Volume number/sequential designation ADIS 47
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Network Attacks. -- Detection Approaches. -- Data Collection. -- Theoretical Foundation Of Detection. -- Architecture and Implementation. -- Alert Management and Correlation. -- Evaluation Criteria. -- Intrusion Response. -- Examples of Commercial and Open Source IDSs
520 ## - SUMMARY, ETC.
Summary, etc Intrusion Detection and Prevention is a rapidly growing field that deals with detecting and responding to malicious network traffic and computer misuse. Intrusion detection is the process of identifying and (possibly) responding to malicious activities targeted at computing and network resources. Any hardware or software automation that monitors, detects or responds to events occurring in a network or on a host computer is considered relevant to the intrusion detection approach. Different intrusion detection systems provide varying functionalities and benefits. Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response. Additionally, it provides an overview of some of the commercially/publicly available intrusion detection and response systems--Cover.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Intrusion detection systems (Computer security)
9 (RLIN) 11277
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Intrusion detection systems (Computer security)
Form subdivision Case studies.
9 (RLIN) 11435
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
9 (RLIN) 77
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures
Form subdivision Case studies.
9 (RLIN) 11436
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Lu, Wei,
Dates associated with a name 1980-
9 (RLIN) 11437
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Tavallaee, Mahbod.
9 (RLIN) 11438
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Advances in information security
9 (RLIN) 11439
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c copycat
d 2
e ncip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Book
Koha issues (borrowed), all copies 4
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Use restrictions Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Invoice number Cost, normal purchase price Total Checkouts Total Renewals Full call number Barcode Date last seen Date checked out Copy number Cost, replacement price Price effective from Koha item type
Not Withdrawn Available   Not Damaged No use restrictions Available for loan Book APU Library APU Library Open Shelf 02/07/2013 EMO A103331 | A103331 314.00 3 4 TK5105.59 .G46 2010 c.1 00007203 24/03/2016 22/02/2016 1 314.00 02/07/2013 General Circulation