It looks like you're offline.
Open Library logo
additional options menu

MARC Record from marc_columbia

Record ID marc_columbia/Columbia-extract-20221130-011.mrc:258147315:2376
Source marc_columbia
Download Link /show-records/marc_columbia/Columbia-extract-20221130-011.mrc:258147315:2376?format=raw

LEADER: 02376cam a22003374a 4500
001 5433565
005 20221110034047.0
008 050912s2005 nyua b 001 0 eng
010 $a 2005040436
020 $a0387204733 (hc : alk. paper)
020 $a0387252282 (ebook)
035 $a(OCoLC)57722506
035 $a(OCoLC)ocm57722506
035 $a(DLC) 2005040436
035 $a(NNC)5433565
035 $a5433565
040 $aDLC$cDLC$dDLC$dOrLoB-B
042 $apcc
050 00 $aTK5105.59$b.K578 2005
082 00 $a005.8$222
100 1 $aKizza, Joseph Migga.$0http://id.loc.gov/authorities/names/n95111736
245 10 $aComputer network security /$cJoseph Migga Kizza.
260 $aNew York :$bSpringer,$c2005.
300 $axxii, 534 pages :$billustrations ;$c24 cm
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
504 $aIncludes bibliographical references and index.
505 00 $g1.$tComputer network fundamentals -- $g2.$tUnderstanding network security -- $g3.$tSecurity threats to computer networks -- $g4.$tComputer network vulnerabilities -- $g5.$tCyber crimes and hackers -- $g6.$tHostile scripts -- $g7.$tSecurity assessment, analysis, and assurance -- $g8.$tAccess control and authorization -- $g9.$tAuthentication -- $g10.$tCryptography -- $g11.$tFirewalls -- $g12.$tSystem intrusion detection and prevention -- $g13.$tComputer and network forensics -- $g14.$tVirus and content filtering -- $g15.$tSecurity evaluations of computer products -- $g16.$tComputer network security protocols and standards -- $g17.$tSecurity in wireless networks and devices -- $g18.$tOther efforts to secure information and computer networks -- $g19.$tLooking ahead - security beyond computer networks -- $g20.$tProjects.
520 1 $a"This text is an invaluable instructional and research tool for courses in computer and information security. Students or practitioners in computer science, information science, technology studies, library sciences, and information management studies will find this text particularly useful for their purposes. In addition, it is a resource for those looking to gain an understanding of computer infrastructures and network security threats."--BOOK JACKET.
650 0 $aComputer networks$xSecurity measures.$0http://id.loc.gov/authorities/subjects/sh94001277
852 00 $boff,eng$hTK5105.59$i.K578 2005