<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>03136nam a2200253 a 4500</leader>
  <controlfield tag="001">1/45089</controlfield>
  <controlfield tag="008">140728s2008    us            001 0 eng  </controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9780123744630</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">0123744636</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="l">48047</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
   <subfield code="a">OPELS</subfield>
   <subfield code="b">eng</subfield>
   <subfield code="c">OPELS</subfield>
   <subfield code="d">OPELS</subfield>
   <subfield code="d">IDEBK</subfield>
   <subfield code="d">OCLCQ</subfield>
   <subfield code="d">OCLCF</subfield>
   <subfield code="d">GR-PeUP</subfield>
  </datafield>
  <datafield tag="245" ind1="0" ind2="0">
   <subfield code="a">Network security</subfield>
   <subfield code="h">[electronic resource] :</subfield>
   <subfield code="b">know it all /</subfield>
   <subfield code="c">by James Joshi ... [et al.].</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
   <subfield code="a">Burlington, MA, USA :</subfield>
   <subfield code="b">Morgan Kaufmann,</subfield>
   <subfield code="c">c2008.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">1 online resource (1 v.)</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
   <subfield code="a">Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security. Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the fields leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources. * Chapters contributed by recognized experts in the field cover theory and practice of network security technology, allowing the reader to develop a new level of knowledge and technical expertise. * Up-to-date coverage of network security issues facilitates learning and lets the reader remain current and fully informed from multiple viewpoints. * Presents methods of analysis and problem-solving techniques, enhancing the readers grasp of the material and ability to implement practical solutions. * Examples illustrate core security concepts for enhanced comprehension.</subfield>
  </datafield>
  <datafield tag="505" ind1="0" ind2=" ">
   <subfield code="a">Ch 1 Network Security Overview-- reprint Ch 8 from Peterson/Davie, Computer Networks 4e (2007) -- 45pp -- Ch 2 Network Attacks-- by Joshi-- reprinted from Qian, Information Assurance (2007)-- 20 pp -- Ch 3 Security and Privacy Architecture-- reprint Ch 9 from McCabe, Network Analysis, Archit. &amp; Design/3e (2007)-- 20 pp -- Ch 4 Concepts in IP Security-- reprint Ch 14 from Farrel, Internet Protocols (2004)-- 40 pp -- Ch 5 Security in Wireless Systems-- reprint Ch 13 from Garg, Wireless Communication &amp; Networking (2007)-- 35pp -- Ch 6 Mobile Security and Privacy-- reprint Ch 9 from Zheng, Smart Phone &amp; Next Gen Mobile Computing (2006) -- 70 pp -- Ch 7 Network Security Algorithms- reprint Ch 17 from Varghese, Network Algorithmics (2005)-- 15 pp -- Ch 8 Optical Network Survivability-- reprint Ch 10 from Ramaswami, Optical Networks/2e (2002)-- 50 pp -- Ch 9 Secure and Resiliant Routing-- by Medhi, reprinted from Qian, Information Assurance (2007)-- 40 pp -- Ch 10 Practical IPv6 Security Solutions-- reprint Ch 23 from Loshin, IPv6 2e (2004)-- 45pp.</subfield>
  </datafield>
  <datafield tag="504" ind1=" " ind2=" ">
   <subfield code="a">Includes bibliographical references and index.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Computer networks</subfield>
   <subfield code="x">Security measures.</subfield>
  </datafield>
  <datafield tag="655" ind1=" " ind2="4">
   <subfield code="a">Electronic books.</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Joshi, James B. D.</subfield>
  </datafield>
  <datafield tag="852" ind1=" " ind2=" ">
   <subfield code="a">INST</subfield>
   <subfield code="b">UNIPILB</subfield>
   <subfield code="c">EBOOKS</subfield>
   <subfield code="e">20140728</subfield>
   <subfield code="p">00b48047</subfield>
   <subfield code="q">00b48047</subfield>
   <subfield code="t">ONLINE</subfield>
   <subfield code="y">0</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="0">
   <subfield code="3">ScienceDirect</subfield>
   <subfield code="u">http://www.sciencedirect.com/science/book/9780123744630</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/03/48047_9780123744630.jpg</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/03/48047_0123744636.jpg</subfield>
  </datafield>
 </record>
</collection>
