MARC details
000 -LEADER |
fixed length control field |
02104cam a22003977a 4500 |
001 - CONTROL NUMBER |
control field |
201124 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
ZET-ke |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20190816104912.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
990127s1999 enka 001 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
99060646 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0131176706 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(DLC)201124 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
OKX |
Transcribing agency |
ZET-ke |
Modifying agency |
DLC |
042 ## - AUTHENTICATION CODE |
Authentication code |
lccopycat |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.76.O63 |
Item number |
L359 2005 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.4/469 |
Edition number |
21 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Laudon, Kenneth C., |
Dates associated with a name |
1944- |
245 10 - TITLE STATEMENT |
Title |
Microsoft Windows server 2003 / |
Statement of responsibility, etc |
Kenneth C. Laudon, Kenneth Rosenblatt. |
Remainder of title |
designing network security |
250 ## - EDITION STATEMENT |
Edition statement |
Brief ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Boston : |
Name of publisher, distributor, etc |
Irwin/McGraw-Hill, |
Date of publication, distribution, etc |
c2005. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xiii, 298 p. : |
Other physical details |
col. ill. ; |
Dimensions |
28 cm. |
440 #0 - SERIES STATEMENT/ADDED ENTRY--TITLE |
Title |
Interactive computing series |
500 ## - GENERAL NOTE |
General note |
Includes index. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Analyzing business and technical requirements -- Planning a framework for designing and implementing security -- Analyzing technical and interoperability constraints -- Designing a public key infrastructure using certificate services -- Designing security for network management -- Designing a security update infrastructure -- Designing a logical authentication strategy -- Designing network infrastructure security -- Designing security based on server roles -- Designing an access control strategy for data -- Creating the physical design for client infrastructure security -- Securing client computers -- Securing internet information services -- Designing security for wireless networks. |
583 ## - ACTION NOTE |
Action |
cat |
Time/date of action |
20000613 |
Action agent |
esc |
Institution to which field applies |
UPB |
583 ## - ACTION NOTE |
Action |
aut |
Time/date of action |
200006 |
Action agent |
mb |
Institution to which field applies |
UPB |
630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Microsoft Windows (Computer file) |
9 (RLIN) |
1523 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Operating systems (Computers) |
9 (RLIN) |
1410 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Watson, Richard |
856 42 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Publisher description |
Uniform Resource Identifier |
<a href="http://www.loc.gov/catdir/description/mh023/99060646.html">http://www.loc.gov/catdir/description/mh023/99060646.html</a> |
856 41 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Table of contents |
Uniform Resource Identifier |
<a href="http://www.loc.gov/catdir/toc/mh023/99060646.html">http://www.loc.gov/catdir/toc/mh023/99060646.html</a> |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
copycat |
d |
3 |
e |
ncip |
f |
19 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Books |
Call number prefix |
QA76.76 |
Call number suffix |
.O63L359 2005 |