The practice of network security monitoring: understanding incident detection and response
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
San Francisco
No Starch Press
2013
|
Ausgabe: | 1. print. |
Schlagworte: | |
Beschreibung: | Includes index |
Beschreibung: | XXX, 341 S. Ill., graph. Darst. |
ISBN: | 1593275099 9781593275099 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV041346557 | ||
003 | DE-604 | ||
005 | 20131016 | ||
007 | t | ||
008 | 131008s2013 ad|| |||| 00||| eng d | ||
010 | |a 2013017966 | ||
020 | |a 1593275099 |9 1-593-27509-9 | ||
020 | |a 9781593275099 |9 978-1-593-27509-9 | ||
035 | |a (OCoLC)858056704 | ||
035 | |a (DE-599)GBV749424141 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-83 | ||
082 | 0 | |a 005.8 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Bejtlich, Richard |e Verfasser |4 aut | |
245 | 1 | 0 | |a The practice of network security monitoring |b understanding incident detection and response |c by Richard Bejtlich |
250 | |a 1. print. | ||
264 | 1 | |a San Francisco |b No Starch Press |c 2013 | |
300 | |a XXX, 341 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes index | ||
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | |5 DE-604 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-026795216 |
Datensatz im Suchindex
_version_ | 1804151422512529408 |
---|---|
any_adam_object | |
author | Bejtlich, Richard |
author_facet | Bejtlich, Richard |
author_role | aut |
author_sort | Bejtlich, Richard |
author_variant | r b rb |
building | Verbundindex |
bvnumber | BV041346557 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)858056704 (DE-599)GBV749424141 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1. print. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01242nam a2200385 c 4500</leader><controlfield tag="001">BV041346557</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20131016 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">131008s2013 ad|| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2013017966</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1593275099</subfield><subfield code="9">1-593-27509-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781593275099</subfield><subfield code="9">978-1-593-27509-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)858056704</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV749424141</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bejtlich, Richard</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The practice of network security monitoring</subfield><subfield code="b">understanding incident detection and response</subfield><subfield code="c">by Richard Bejtlich</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. print.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">San Francisco</subfield><subfield code="b">No Starch Press</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXX, 341 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026795216</subfield></datafield></record></collection> |
id | DE-604.BV041346557 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:54:34Z |
institution | BVB |
isbn | 1593275099 9781593275099 |
language | English |
lccn | 2013017966 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026795216 |
oclc_num | 858056704 |
open_access_boolean | |
owner | DE-83 |
owner_facet | DE-83 |
physical | XXX, 341 S. Ill., graph. Darst. |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | No Starch Press |
record_format | marc |
spelling | Bejtlich, Richard Verfasser aut The practice of network security monitoring understanding incident detection and response by Richard Bejtlich 1. print. San Francisco No Starch Press 2013 XXX, 341 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Includes index Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Rechnernetz (DE-588)4070085-9 s DE-604 |
spellingShingle | Bejtlich, Richard The practice of network security monitoring understanding incident detection and response Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4070085-9 |
title | The practice of network security monitoring understanding incident detection and response |
title_auth | The practice of network security monitoring understanding incident detection and response |
title_exact_search | The practice of network security monitoring understanding incident detection and response |
title_full | The practice of network security monitoring understanding incident detection and response by Richard Bejtlich |
title_fullStr | The practice of network security monitoring understanding incident detection and response by Richard Bejtlich |
title_full_unstemmed | The practice of network security monitoring understanding incident detection and response by Richard Bejtlich |
title_short | The practice of network security monitoring |
title_sort | the practice of network security monitoring understanding incident detection and response |
title_sub | understanding incident detection and response |
topic | Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | Computersicherheit Rechnernetz |
work_keys_str_mv | AT bejtlichrichard thepracticeofnetworksecuritymonitoringunderstandingincidentdetectionandresponse |