MARC details
000 -LEADER |
fixed length control field |
02524nam a22002777a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20241121135740.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
241121b ph ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781133279075 |
040 ## - CATALOGING SOURCE |
Transcribing agency |
NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA 76.9.A25 .G85 2013 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Whitman, Michael E. |
Relator term |
author |
245 ## - TITLE STATEMENT |
Title |
Guide to network security / |
Statement of responsibility, etc. |
Michael E. Whitman, Herbert J. Mattord, David Mackey and Andrew Green |
250 ## - EDITION STATEMENT |
Edition statement |
International Edition. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Boston, MA : |
Name of publisher, distributor, etc. |
Course Technology/Cengage Learning, |
Date of publication, distribution, etc. |
c2013. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxii, 554 pages ; |
Dimensions |
24 cm. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
<br/>Introduction to information security -- Introduction to networking -- Cryptography -- Firewall technologies and administration -- Network authentication and remote access using VPN -- Network monitoring and intrusion detection and prevention systems -- Wireless network security -- Security of web applications -- Network vulnerability assessment -- Auditing, monitoring, and logging -- Contingency planning and networking incident response -- Digital forensics. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
This book is a wide-ranging new text that provides a detailed review of the network security field, including essential terminology, the history of the discipline, and practical techniques to manage implementation of network security solutions. It begins with an overview of information, network, and web security, emphasizing the role of data communications and encryption. The authors then explore network perimeter defense technologies and methods, including access controls, firewalls, VPNs, and intrusion detection systems, as well as applied cryptography in public key infrastructure, wireless security, and web commerce. The final section covers additional topics relevant for information security practitioners, such as assessing network security, professional careers in the field, and contingency planning. Perfect for both aspiring and active IT professionals, GUIDE TO NETWORK SECURITY is an ideal resource for readers who want to help organizations protect critical information assets and secure their systems and networks, both by recognizing current threats and vulnerabilities, and by designing and developing the secure systems of the future. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
COMPUTER SECURITY |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
DIGITAL FORENSIC SCIENCE |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Mattord, Herbert J. |
Relator term |
co-author |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Mackey, David (David H.) |
Relator term |
co-author |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Green, Andrew |
Relator term |
co-author |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Books |
Suppress in OPAC |
No |