Intrusion detection: an introduction to Internet surveillance, correlation, traps trace back, and response
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Sparte, NJ
Intrusion.Net Books
1999
|
Ausgabe: | 1. ed. 2. pr., minor corr. |
Schlagworte: | |
Beschreibung: | 218 S. |
ISBN: | 0966670078 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV017065196 | ||
003 | DE-604 | ||
005 | 20040930 | ||
007 | t | ||
008 | 030414s1999 |||| 00||| eng d | ||
020 | |a 0966670078 |9 0-9666700-7-8 | ||
035 | |a (OCoLC)40265474 | ||
035 | |a (DE-599)BVBBV017065196 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-91G | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.8 |2 21 | |
084 | |a DAT 614f |2 stub | ||
100 | 1 | |a Amoroso, Edward G. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Intrusion detection |b an introduction to Internet surveillance, correlation, traps trace back, and response |c Edward G. Amoroso |
250 | |a 1. ed. 2. pr., minor corr. | ||
264 | 1 | |a Sparte, NJ |b Intrusion.Net Books |c 1999 | |
300 | |a 218 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Internet |x Security measures | |
999 | |a oai:aleph.bib-bvb.de:BVB01-010297093 |
Datensatz im Suchindex
_version_ | 1804129957167759360 |
---|---|
any_adam_object | |
author | Amoroso, Edward G. |
author_facet | Amoroso, Edward G. |
author_role | aut |
author_sort | Amoroso, Edward G. |
author_variant | e g a eg ega |
building | Verbundindex |
bvnumber | BV017065196 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_tum | DAT 614f |
ctrlnum | (OCoLC)40265474 (DE-599)BVBBV017065196 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1. ed. 2. pr., minor corr. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01027nam a2200337 c 4500</leader><controlfield tag="001">BV017065196</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20040930 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">030414s1999 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0966670078</subfield><subfield code="9">0-9666700-7-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)40265474</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV017065196</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 614f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Amoroso, Edward G.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Intrusion detection</subfield><subfield code="b">an introduction to Internet surveillance, correlation, traps trace back, and response</subfield><subfield code="c">Edward G. Amoroso</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. ed. 2. pr., minor corr.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sparte, NJ</subfield><subfield code="b">Intrusion.Net Books</subfield><subfield code="c">1999</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">218 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-010297093</subfield></datafield></record></collection> |
id | DE-604.BV017065196 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T19:13:23Z |
institution | BVB |
isbn | 0966670078 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-010297093 |
oclc_num | 40265474 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM |
owner_facet | DE-91G DE-BY-TUM |
physical | 218 S. |
publishDate | 1999 |
publishDateSearch | 1999 |
publishDateSort | 1999 |
publisher | Intrusion.Net Books |
record_format | marc |
spelling | Amoroso, Edward G. Verfasser aut Intrusion detection an introduction to Internet surveillance, correlation, traps trace back, and response Edward G. Amoroso 1. ed. 2. pr., minor corr. Sparte, NJ Intrusion.Net Books 1999 218 S. txt rdacontent n rdamedia nc rdacarrier Computer networks Security measures Computer security Internet Security measures |
spellingShingle | Amoroso, Edward G. Intrusion detection an introduction to Internet surveillance, correlation, traps trace back, and response Computer networks Security measures Computer security Internet Security measures |
title | Intrusion detection an introduction to Internet surveillance, correlation, traps trace back, and response |
title_auth | Intrusion detection an introduction to Internet surveillance, correlation, traps trace back, and response |
title_exact_search | Intrusion detection an introduction to Internet surveillance, correlation, traps trace back, and response |
title_full | Intrusion detection an introduction to Internet surveillance, correlation, traps trace back, and response Edward G. Amoroso |
title_fullStr | Intrusion detection an introduction to Internet surveillance, correlation, traps trace back, and response Edward G. Amoroso |
title_full_unstemmed | Intrusion detection an introduction to Internet surveillance, correlation, traps trace back, and response Edward G. Amoroso |
title_short | Intrusion detection |
title_sort | intrusion detection an introduction to internet surveillance correlation traps trace back and response |
title_sub | an introduction to Internet surveillance, correlation, traps trace back, and response |
topic | Computer networks Security measures Computer security Internet Security measures |
topic_facet | Computer networks Security measures Computer security Internet Security measures |
work_keys_str_mv | AT amorosoedwardg intrusiondetectionanintroductiontointernetsurveillancecorrelationtrapstracebackandresponse |