AUD Library Catalog

Normal view MARC view

Network intrusion detection and prevention : (Record no. 31139)

MARC details
000 -LEADER
fixed length control field 02568nam a2200349Ia 4500
001 - CONTROL NUMBER
control field 31139
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100909s2010 nyua b 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780387887708 (hbk.) :
Terms of availability 99.00
050 14 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .G63 2010
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (OCLC)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) TK 5105.59 .G63 2010
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Ghorbani, Ali,
Dates associated with a name 1954-
9 (RLIN) 11566
245 10 - TITLE STATEMENT
Title Network intrusion detection and prevention :
Remainder of title concepts and techniques /
Statement of responsibility, etc Ali A. Ghorbani, Wei Lu, Mahbod Taballaee
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New York :
Name of publisher, distributor, etc Springer,
Date of publication, distribution, etc c2010
300 ## - PHYSICAL DESCRIPTION
Extent xviii, 212 p. :
Other physical details ill. ;
Dimensions 24 cm
490 1# - SERIES STATEMENT
Series statement Advances in information security ;
Volume number/sequential designation ADIS 47
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index
520 ## - SUMMARY, ETC.
Summary, etc Intrusion Detection and Prevention is a rapidly growing field that deals with detecting and responding to malicious network traffic and computer misuse. Intrusion detection is the process of identifying and (possibly) responding to malicious activities targeted at computing and network resources. Any hardware or software automation that monitors, detects or responds to events occurring in a network or on a host computer is considered relevant to the intrusion detection approach. Different intrusion detection systems provide varying functionalities and benefits. Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response. Additionally, it provides an overview of some of the commercially/publicly available intrusion detection and response systems--Cover
533 ## - REPRODUCTION NOTE
Type of reproduction Electronic reproduction.
Place of reproduction New York :
Agency responsible for reproduction Springer,
Date of reproduction 2010.
Note about reproduction Mode of access: World Wide Web.
-- System requirements: Web browser.
-- Title from title screen (viewed on Aug. 9, 2010).
-- Access may be restricted to users at subscribing institutions
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Intrusion detection systems (Computer security)
9 (RLIN) 146180
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Intrusion detection systems (Computer security)
Form subdivision Case studies
9 (RLIN) 146181
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures
9 (RLIN) 146182
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures
Form subdivision Case studies
9 (RLIN) 146183
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Lu, Wei,
Dates associated with a name 1980-
9 (RLIN) 25459
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Tavallaee, Mahbod
9 (RLIN) 146184
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Advances in information security
9 (RLIN) 146185
852 1# - LOCATION/CALL NUMBER
-- P99.00usd
907 ## - LOCAL DATA ELEMENT G, LDG (RLIN)
a
b 02-13-11
c 01-31-11
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
998 ## - LOCAL CONTROL INFORMATION (RLIN)
-- audmc
Operator's initials, OID (RLIN) 02-13-11
Cataloger's initials, CIN (RLIN) m
First Date, FD (RLIN) a
-- -
-- eng
-- nyu
-- 0
945 ## - LOCAL PROCESSING INFORMATION (OCLC)
g 0
i 5017698
j 0
l audmc
o -
p 363.63
q -
r -
s -
t 1
u 0
v 0
w 0
x 0
y i12263308
z 01-31-11
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type
  Library of Congress Classification     American University in Dubai American University in Dubai Main Collection 2011-01-31 363.63   TK 5105.59 .G63 2010 5017698 2023-12-01 363.63 2015-07-25 Books
  • Monday - Friday
  • 8:00 AM - 5:00 PM
  • Saturday - Sunday
  • Closed
  • Phone: +971 431 83183
  • Email: Library@aud.edu
  • Address: Sheikh Zayed Road -- P.O. Box 28282, Dubai, AE
  • Map & Directions