Applied network security monitoring : (Record no. 20386)

MARC details
000 -LEADER
fixed length control field 01535cam a22002895a 4500
001 - CONTROL NUMBER
control field 17961159
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20201128021441.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 131203t2014 maua frb 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780124172081 (paperback)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Modifying agency DLC
-- EG-ScBUE
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
Item number SAN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Sanders, Chris,
Dates associated with a name 1986-
9 (RLIN) 39240
245 10 - TITLE STATEMENT
Title Applied network security monitoring :
Remainder of title collection, detection, and analysis /
Statement of responsibility, etc Chris Sanders, Jason Smith ; editor David J. Bianco
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Waltham :
Name of publisher, distributor, etc Syngress / Elsevier,
Date of publication, distribution, etc c.2014.
300 ## - PHYSICAL DESCRIPTION
Extent xxiv, 472 p. :
Other physical details ill. ;
Dimensions 24 cm.
500 ## - GENERAL NOTE
General note Index : p. 467-472.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Machine generated contents note: Introduction to NSM Driving Data Collection The Sensor Platform Full Packet Capture Data Session Data Protocol Metadata Statistical Data Indicators of Compromise Target-Based Detection Signature-Based Detection with Snort Signature-Based Detection with Suricata Anomaly-Based Detection with Bro Early Warning AS&W with Honeypots Packet Analysis Friendly Intelligence Hostile Intelligence Differential Diagnosis of NSM Events Incident Morbidity and Mortality Malware Analysis for NSM .
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
Source of heading or term BUEsh
9 (RLIN) 2637
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
Source of heading or term BUEsh
9 (RLIN) 2634
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Open source intelligence.
Source of heading or term BUEsh
9 (RLIN) 39241
651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME
Source of heading or term BUEsh
653 ## - INDEX TERM--UNCONTROLLED
Resource For college Informatics and Computer Science
Arrived date list July2015
-- February2016
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Smith, Jason
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Bianco, David J.,
Relator term editor.
9 (RLIN) 37835
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Koha collection Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Serial Enumeration / chronology Total Checkouts Full call number Barcode Date last seen Cost, replacement price Koha item type
    Dewey Decimal Classification     Baccah Central Library Central Library Lower Floor 30/07/2015 Purchase 400.00 21759   005.8 SAN 000039616 12/02/2024 500.00 Book - Borrowing