The state of the art in intrusion prevention and detection / (Record no. 14446)

MARC details
000 -LEADER
fixed length control field 01789nam a22003378i 4500
001 - CONTROL NUMBER
control field 28052
003 - CONTROL NUMBER IDENTIFIER
control field BD-DhAAL
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140617160455.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140617s2014 flu b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2013030986
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781482203516 (hbk. : alk. paper)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Description conventions rda
Modifying agency DLC
-- BD-DhAAL
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number S7354
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
245 04 - TITLE STATEMENT
Title The state of the art in intrusion prevention and detection /
Statement of responsibility, etc edited by Al-Sakib Khan Pathan.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc London ;
-- Boca Raton :
Name of publisher, distributor, etc CRC Press,
Date of publication, distribution, etc 2014
300 ## - PHYSICAL DESCRIPTION
Extent xvii, 496 p. :
Other physical details ill. ;
Dimensions 22 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc "This book analyzes the latest trends and issues about intrusion detection systems in computer networks and systems. It examines wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks. Topics covered include new techniques and research on intrusion detection schemes, intrusion prevention schemes, tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, AI based techniques; physical intrusion in wired and wireless networks; and agent-based intrusion surveillance, detection, and prevention"--
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
9 (RLIN) 5083
Topical term or geographic name as entry element Computers
General subdivision Access control.
9 (RLIN) 5084
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
9 (RLIN) 1016
Topical term or geographic name as entry element COMPUTERS / Networking / General.
Source of heading or term bisacsh
9 (RLIN) 5085
Topical term or geographic name as entry element COMPUTERS / Security / General.
Source of heading or term bisacsh
9 (RLIN) 5086
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Pathan, Al-Sakib Khan.
9 (RLIN) 1018
852 ## - LOCATION/CALL NUMBER
Location Ayesha Abed Library
Shelving location General Shelf
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Cover image
Uniform Resource Identifier <a href="http://images.tandf.co.uk/common/jackets/websmall/978148220/9781482203516.jpg">http://images.tandf.co.uk/common/jackets/websmall/978148220/9781482203516.jpg</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Total Renewals Full call number Barcode Checked out Date last seen Date last borrowed Copy number Price effective from Koha item type
    Dewey Decimal Classification     Ayesha Abed Library Ayesha Abed Library General Stacks 17/06/2014 2 6 005.8 STA 3010028052 09/07/2024 02/07/2024 02/07/2024 1 17/06/2014 Book