Learning Resource and Development

Network security strategies : (Record no. 28252)

MARC details
000 -LEADER
fixed length control field 01523nam a2200265 i 4500
003 - CONTROL NUMBER IDENTIFIER
control field CSPC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20241002141202.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 241002s2020 -uka b 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781789806298
040 ## - CATALOGING SOURCE
Original cataloging agency CSPC
Language of cataloging eng
Transcribing agency CSPC
Description conventions rda
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
082 #4 - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23
Classification number 005.8
Item number M896n
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Mukherjee, Aditya,
Relator term author.
245 10 - TITLE STATEMENT
Title Network security strategies :
Remainder of title protect your network and enterprise against advanced cybersecurity attacks and threats /
Statement of responsibility, etc. Aditya Mukherjee.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Birmingham, UK :
Name of producer, publisher, distributor, manufacturer Packt Publishing Ltd.,
Date of production, publication, distribution, manufacture, or copyright notice 2020.
300 ## - PHYSICAL DESCRIPTION
Extent ix, 372 pages :
Other physical details illustrations ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Section 1: Network security concepts, threats, and vulnerabilities -- Network security concepts -- Security for cloud and wireless networks -- Mitigating the top network threats of 2020 -- Section 2: Network security testing and auditing -- Network penetration testing and best practices -- Advanced network attacks -- Network digital forensics -- Performing network auditing -- Section 3: Threat management and proactive security operations -- Continuous and effective threat management -- Proactive security strategies.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Suppress in OPAC No
Koha item type Books
Edition 23
Classification part 005.8
Item part M896n
Call number prefix GRD
Call number suffix 2020
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main Library Main Library Graduate School Library 10/02/2024   GRD 005.8 M896n 2020 028371 10/02/2024 1-1 10/02/2024 Books