Actually Useful Internet Security Techniques / (Record no. 7213)

MARC details
000 -LEADER
fixed length control field 01180cam a2200265 a 4500
001 - CONTROL NUMBER
control field vtls000003637
003 - CONTROL NUMBER IDENTIFIER
control field VRT
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250102223206.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 081227s1995 inua |b 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 95-036608
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1562055089
039 #9 - LEVEL OF BIBLIOGRAPHIC CONTROL AND CODING DETAIL [OBSOLETE]
Level of rules in bibliographic description 202302210945
Level of effort used to assign nonsubject heading access points shakra
Level of effort used to assign subject headings 201402040112
Level of effort used to assign classification VLOAD
Level of effort used to assign subject headings 201005221036
Level of effort used to assign classification malmash
Level of effort used to assign subject headings 200812271236
Level of effort used to assign classification venkatrajand
-- 200812271235
-- venkatrajand
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5101.59
Item number .H83 1995
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition information 20
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Hughes, Larry J.,
Dates associated with a name 1961-
9 (RLIN) 18571
245 10 - TITLE STATEMENT
Title Actually Useful Internet Security Techniques /
Statement of responsibility, etc. Larry J. Hughes, Jr.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Indianapolis, Ind. :
Name of publisher, distributor, etc. New Riders Pub.,
Date of publication, distribution, etc. c1995.
300 ## - PHYSICAL DESCRIPTION
Extent xv, 378 p. :
Other physical details ill. ;
Dimensions 24 cm.
500 ## - GENERAL NOTE
General note "Covers SATAN and spoofing"--Cover.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (p. [353]-359) and index.
520 ## - SUMMARY, ETC.
Summary, etc. This text addresses security issues by examining each common Internet application and pulling from it the potential security problems. It shows how to configure and maintain a computer and network against the security exposures of the Internet.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet.
9 (RLIN) 953
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
9 (RLIN) 4473
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Suppress in OPAC No
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Library of Congress Classification     Library Library First Floor 21/12/2024   TK5101.59 .H83 1995 3120 21/12/2024 1 21/12/2024 Books
New Arrivals

Loading...

Contact Us

Library: Location maps

Phone: 00968 2323 7091 Email: Ask us a question

Library Hours

Sunday - Thursday 7:30AM - 8:00 PM

Friday - Saturday Closed