000 -LEADER |
fixed length control field |
08621cam a2200457Ma 4500 |
001 - CONTROL NUMBER |
control field |
u11870 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
SA-PMU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20210418124927.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
110520s2011 maua b 001 0 eng d |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
UKMGB |
Language of cataloging |
eng |
Transcribing agency |
UKMGB |
Modifying agency |
TZF |
-- |
LHU |
-- |
OCLCF |
-- |
OCLCO |
-- |
OCLCQ |
015 ## - NATIONAL BIBLIOGRAPHY NUMBER |
National bibliography number |
GBB161721 |
Source |
bnb |
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER |
Record control number |
015813352 |
Source |
Uk |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780321336316 |
Qualifying information |
(hbk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0321336313 |
Qualifying information |
(hbk.) |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)751713212 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5105.55 |
Item number |
.S74 2012 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
004.62 |
Edition number |
22 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) |
OCLC library identifier |
AU@ |
System control number |
000054878885 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Fall, Kevin R. |
245 10 - TITLE STATEMENT |
Title |
TCP/IP illustrated. |
Number of part/section of a work |
Volume 1, |
Name of part/section of a work |
The protocols / |
Statement of responsibility, etc. |
Kevin R. Fall, W. Richard Stevens. |
250 ## - EDITION STATEMENT |
Edition statement |
2nd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Boston, Mass. ; |
-- |
London : |
Name of publisher, distributor, etc. |
Addison-Wesley, |
Date of publication, distribution, etc. |
©2012. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxxv, 1017 Pages; 1 volume : |
Other physical details |
illustrations ; |
Dimensions |
24 cm. |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Media type code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Carrier type code |
nc |
Source |
rdacarrier |
490 0# - SERIES STATEMENT |
Series statement |
Addison-Wesley professional computing series |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and indexes. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Chapter 1: Introduction -- 1.1 Architectural Principles -- 1.2 Design and Implementation -- 1.3 The Architecture and Protocols of the TCP/IP Suite -- 1.4 Internets, Intranets, and Extranets -- 1.5 Designing Applications -- 1.6 Standardization Process -- 1.7 Implementations and Software Distributions -- 1.8 Attacks Involving the Internet Architecture -- Chapter 2: The Internet Address Architecture -- 2.1 Introduction -- 2.2 Expressing IP Addresses -- 2.3 Basic IP Address Structure -- 2.4 CIDR and Aggregation -- 2.5 Special-Use Addresses -- 2.6 Allocation -- 2.7 Unicast Address Assignment -- 2.8 Attacks Involving IP Addresses -- Chapter 3: Link Layer -- 3.1 Introduction -- 3.2 Ethernet and the IEEE 802 LAN/MAN Standards -- 3.3 Full Duplex, Power Save, Autonegotiation, and 802.1X Flow Control -- 3.4 Bridges and Switches -- 3.5 Wireless LANs--IEEE 802.11(Wi-Fi) -- 3.6 Point-to-Point Protocol (PPP) -- 3.7 Loopback -- 3.8 MTU and Path MTU -- 3.9 Tunneling Basics -- 3.10 Attacks on the Link Layer -- Chapter 4: ARP: Address Resolution Protocol -- 4.1 Introduction -- 4.2 An Example -- 4.3 ARP Cache -- 4.4 ARP Frame Format -- 4.5 ARP Examples -- 4.6 ARP Cache Timeout -- 4.7 Proxy ARP -- 4.8 Gratuitous ARP and Address Conflict Detection (ACD) -- 4.9 The arp Command -- 4.10 Using ARP to Set an Embedded Device's IPv4 Address -- 4.11 Attacks Involving ARP -- Chapter 5: The Internet Protocol (IP) -- 5.1 Introduction -- 5.2 IPv4 and IPv6 Headers -- 5.3 IPv6 Extension Headers -- 5.4 IP Forwarding -- 5.5 Mobile IP -- 5.6 Host Processing of IP Datagrams -- 5.7 Attacks Involving IP -- Chapter 6: System Configuration: DHCP and Autoconfiguration -- 6.1 Introduction -- 6.2 Dynamic Host Configuration Protocol (DHCP) -- 6.3 Stateless Address Autoconfiguration (SLAAC) -- 6.4 DHCP and DNS Interaction -- 6.5 PPP over Ethernet (PPPoE) -- 6.6 Attacks Involving System Configuration -- Chapter 7: Firewalls and Network Address Translation (NAT) -- 7.1 Introduction -- 7.2 Firewalls -- 7.3 Network Address Translation (NAT) -- 7.4 NAT Traversal -- 7.5 Configuring Packet-Filtering Firewalls and NATs -- 7.6 NAT for IPv4/IPv6 Coexistence and Transition -- 7.7 Attacks Involving Firewalls and NATs -- Chapter 8: ICMPv4 and ICMPv6: Internet Control Message Protocol -- 8.1 Introduction -- 8.2 ICMP Messages -- 8.3 ICMP Error Messages -- 8.4 ICMP Query/Informational Messages -- 8.5 Neighbor Discovery in IPv6 -- 8.6 Translating ICMPv4 and ICMPv6 -- 8.7 Attacks Involving ICMP. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Chapter 9: Broadcasting and Local Multicasting (IGMP and MLD) -- 9.1 Introduction -- 9.2 Broadcasting -- 9.3 Multicasting -- 9.4 The Internet Group Management Protocol (IGMP) and Multicast Listener Discovery Protocol (MLD) -- 9.5 Attacks Involving IGMP and MLD -- Chapter 10: User Datagram Protocol (UDP) and IP Fragmentation -- 10.1 Introduction -- 10.2 UDP Header -- 10.3 UDP Checksum -- 10.4 Examples -- 10.5 UDP and IPv6 -- 10.6 UDP-Lite -- 10.7 IP Fragmentation -- 10.8 Path MTU Discovery with UDP -- 10.9 Interaction between IP Fragmentation and ARP/ND -- 10.10 Maximum UDP Datagram Size -- 10.11 UDP Server Design -- 10.12 Translating UDP/IPv4 and UDP/IPv6 Datagrams -- 10.13 UDP in the Internet -- 10.14 Attacks Involving UDP and IP Fragmentation -- Chapter 11: Name Resolution and the Domain Name System (DNS) -- 11.1 Introduction -- 11.2 The DNS Name Space -- 11.3 Name Servers and Zones -- 11.4 Caching -- 11.5 The DNS Protocol -- 11.6 Sort Lists, Round-Robin, and Split DNS -- 11.7 Open DNS Servers and DynDNS -- 11.8 Transparency and Extensibility -- 11.9 Translating DNS from IPv4 to IPv6 (DNS64) -- 11.10 LLMNR and mDNS -- 11.11 LDAP -- 11.12 Attacks on the DNS -- Chapter 12: TCP: The Transmission Control Protocol (Preliminaries) -- 12.1 Introduction -- 12.2 Introduction to TCP -- 12.3 TCP Header and Encapsulation -- Chapter 13: TCP Connection Management -- 13.1 Introduction -- 13.2 TCP Connection Establishment and Termination -- 13.3 TCP Options -- 13.4 Path MTU Discovery with TCP -- 13.5 TCP State Transitions -- 13.6 Reset Segments -- 13.7 TCP Server Operation -- 13.8 Attacks Involving TCP Connection Management -- Chapter 14: TCP Timeout and Retransmission -- 14.1 Introduction -- 14.2 Simple Timeout and Retransmission Example -- 14.3 Setting the Retransmission Timeout (RTO) -- 14.4 Timer-Based Retransmission -- 14.5 Fast Retransmit -- 14.6 Retransmission with Selective Acknowledgments -- 14.7 Spurious Timeouts and Retransmissions -- 14.8 Packet Reordering and Duplication -- 14.9 Destination Metrics -- 14.10 Repacketization -- 14.11 Attacks Involving TCP Retransmission -- Chapter 15: TCP Data Flow and Window Management -- 15.1 Introduction -- 15.2 Interactive Communication -- 15.3 Delayed Acknowledgments -- 15.4 Nagle Algorithm -- 15.5 Flow Control and Window Management -- 15.6 Urgent Mechanism -- 15.7 Attacks Involving Window Management. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Chapter 16: TCP Congestion Control -- 16.1 Introduction -- 16.2 The Classic Algorithms -- 16.3 Evolution of the Standard Algorithms -- 16.4 Handling Spurious RTOs--the Eifel Response Algorithm -- 16.5 An Extended Example -- 16.6 Sharing Congestion State -- 16.7 TCP Friendliness -- 16.8 TCP in High-Speed Environments -- 16.9 Delay-Based Congestion Control -- 16.10 Buffer Bloat -- 16.11 Active Queue Management and ECN -- 16.12 Attacks Involving TCP Congestion Control -- Chapter 17: TCP Keepalive -- 17.1 Introduction -- 17.2 Description -- 17.3 Attacks Involving TCP Keepalives -- Chapter 18: Security: EAP, IPsec, TLS, DNSSEC, and DKIM -- 18.1 Introduction -- 18.2 Basic Principles of Information Security -- 18.3 Threats to Network Communication -- 18.4 Basic Cryptography and Security Mechanisms -- 18.5 Certificates, Certificate Authorities (CAs), and PKIs -- 18.6 TCP/IP Security Protocols and Layering -- 18.7 Network Access Control: 802.1X, 802.1AE, EAP, and PANA -- 18.8 Layer 3 IP Security (IPsec) -- 18.9 Transport Layer Security (TLS and DTLS) -- 18.10 DNS Security (DNSSEC) -- 18.11 DomainKeys Identified Mail (DKIM) -- 18.12 Attacks on Security Protocols. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"More than 162,000 networking professionals have relied on W. Richard Stevens' classic TCP/IP Illustrated, Volume 1 to gain the detailed understanding of TCP/IP they need to be effective. Now, the world's leading TCP/IP best-seller has been thoroughly updated to reflect a new generation of TCP/IP-based networking technologies. TCP/IP Illustrated, Volume 1, Second Edition doesn't just describe protocols: it enables readers to observe how these protocols operate under different conditions, using publicly available tools, and explains why key design decisions were made. The result: readers gain a deep understanding of how TCP/IP protocols function, and why they function that way. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Now thoroughly updated by long-time networking expert Kevin Fall, this brand-new second edition's extensive new coverage includes: Remote procedure call ; Identity management (access control / authentication); Network and transport layer security (authentication / privacy); File access protocols, including NFS and SMB/CIFS; Host initialization and DHCP; NAT and firewalls; E-mail; Web and web services; Wireless and wireless security and New tools, including Ethereal, nmap and netcat."--Pub. desc. |
596 ## - |
-- |
1 2 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
TCP/IP (Computer network protocol) |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
TCP/IP (Computer network protocol) |
Source of heading or term |
fast |
Authority record control number or standard number |
(OCoLC)fst01141584 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Stevens, W. Richard. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Books |
994 ## - |
-- |
Z0 |
-- |
SUPMU |
948 ## - LOCAL PROCESSING INFORMATION (OCLC); SERIES PART DESIGNATOR (RLIN) |
h (OCLC) |
NO HOLDINGS IN SUPMU - 9 OTHER HOLDINGS |