The practice of network security monitoring understanding incident detection and response
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
San Francisco
No Starch Press
2013
|
Ausgabe: | 1. print. |
Schlagworte: | |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV041346557 | ||
003 | DE-604 | ||
005 | 20131016 | ||
007 | t| | ||
008 | 131008s2013 xx ad|| |||| 00||| eng d | ||
010 | |a 2013017966 | ||
020 | |a 1593275099 |9 1-593-27509-9 | ||
020 | |a 9781593275099 |9 978-1-593-27509-9 | ||
035 | |a (OCoLC)858056704 | ||
035 | |a (DE-599)GBV749424141 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-83 | ||
082 | 0 | |a 005.8 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Bejtlich, Richard |e Verfasser |4 aut | |
245 | 1 | 0 | |a The practice of network security monitoring |b understanding incident detection and response |c by Richard Bejtlich |
250 | |a 1. print. | ||
264 | 1 | |a San Francisco |b No Starch Press |c 2013 | |
300 | |a XXX, 341 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes index | ||
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | |5 DE-604 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-026795216 |
Datensatz im Suchindex
_version_ | 1819292431355478018 |
---|---|
any_adam_object | |
author | Bejtlich, Richard |
author_facet | Bejtlich, Richard |
author_role | aut |
author_sort | Bejtlich, Richard |
author_variant | r b rb |
building | Verbundindex |
bvnumber | BV041346557 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)858056704 (DE-599)GBV749424141 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1. print. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01243nam a2200385 c 4500</leader><controlfield tag="001">BV041346557</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20131016 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">131008s2013 xx ad|| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2013017966</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1593275099</subfield><subfield code="9">1-593-27509-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781593275099</subfield><subfield code="9">978-1-593-27509-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)858056704</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV749424141</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bejtlich, Richard</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The practice of network security monitoring</subfield><subfield code="b">understanding incident detection and response</subfield><subfield code="c">by Richard Bejtlich</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. print.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">San Francisco</subfield><subfield code="b">No Starch Press</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXX, 341 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026795216</subfield></datafield></record></collection> |
id | DE-604.BV041346557 |
illustrated | Illustrated |
indexdate | 2024-12-24T03:54:24Z |
institution | BVB |
isbn | 1593275099 9781593275099 |
language | English |
lccn | 2013017966 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026795216 |
oclc_num | 858056704 |
open_access_boolean | |
owner | DE-83 |
owner_facet | DE-83 |
physical | XXX, 341 S. Ill., graph. Darst. |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | No Starch Press |
record_format | marc |
spelling | Bejtlich, Richard Verfasser aut The practice of network security monitoring understanding incident detection and response by Richard Bejtlich 1. print. San Francisco No Starch Press 2013 XXX, 341 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Includes index Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Rechnernetz (DE-588)4070085-9 s DE-604 |
spellingShingle | Bejtlich, Richard The practice of network security monitoring understanding incident detection and response Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4070085-9 |
title | The practice of network security monitoring understanding incident detection and response |
title_auth | The practice of network security monitoring understanding incident detection and response |
title_exact_search | The practice of network security monitoring understanding incident detection and response |
title_full | The practice of network security monitoring understanding incident detection and response by Richard Bejtlich |
title_fullStr | The practice of network security monitoring understanding incident detection and response by Richard Bejtlich |
title_full_unstemmed | The practice of network security monitoring understanding incident detection and response by Richard Bejtlich |
title_short | The practice of network security monitoring |
title_sort | the practice of network security monitoring understanding incident detection and response |
title_sub | understanding incident detection and response |
topic | Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | Computersicherheit Rechnernetz |
work_keys_str_mv | AT bejtlichrichard thepracticeofnetworksecuritymonitoringunderstandingincidentdetectionandresponse |