TCP/IP illustrated. (Record no. 10439)

000 -LEADER
fixed length control field 08621cam a2200457Ma 4500
001 - CONTROL NUMBER
control field u11870
003 - CONTROL NUMBER IDENTIFIER
control field SA-PMU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210418124927.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 110520s2011 maua b 001 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency UKMGB
Language of cataloging eng
Transcribing agency UKMGB
Modifying agency TZF
-- LHU
-- OCLCF
-- OCLCO
-- OCLCQ
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBB161721
Source bnb
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 015813352
Source Uk
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780321336316
Qualifying information (hbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0321336313
Qualifying information (hbk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)751713212
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.55
Item number .S74 2012
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.62
Edition number 22
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000054878885
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Fall, Kevin R.
245 10 - TITLE STATEMENT
Title TCP/IP illustrated.
Number of part/section of a work Volume 1,
Name of part/section of a work The protocols /
Statement of responsibility, etc. Kevin R. Fall, W. Richard Stevens.
250 ## - EDITION STATEMENT
Edition statement 2nd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boston, Mass. ;
-- London :
Name of publisher, distributor, etc. Addison-Wesley,
Date of publication, distribution, etc. ©2012.
300 ## - PHYSICAL DESCRIPTION
Extent xxxv, 1017 Pages; 1 volume :
Other physical details illustrations ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
490 0# - SERIES STATEMENT
Series statement Addison-Wesley professional computing series
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and indexes.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1: Introduction -- 1.1 Architectural Principles -- 1.2 Design and Implementation -- 1.3 The Architecture and Protocols of the TCP/IP Suite -- 1.4 Internets, Intranets, and Extranets -- 1.5 Designing Applications -- 1.6 Standardization Process -- 1.7 Implementations and Software Distributions -- 1.8 Attacks Involving the Internet Architecture -- Chapter 2: The Internet Address Architecture -- 2.1 Introduction -- 2.2 Expressing IP Addresses -- 2.3 Basic IP Address Structure -- 2.4 CIDR and Aggregation -- 2.5 Special-Use Addresses -- 2.6 Allocation -- 2.7 Unicast Address Assignment -- 2.8 Attacks Involving IP Addresses -- Chapter 3: Link Layer -- 3.1 Introduction -- 3.2 Ethernet and the IEEE 802 LAN/MAN Standards -- 3.3 Full Duplex, Power Save, Autonegotiation, and 802.1X Flow Control -- 3.4 Bridges and Switches -- 3.5 Wireless LANs--IEEE 802.11(Wi-Fi) -- 3.6 Point-to-Point Protocol (PPP) -- 3.7 Loopback -- 3.8 MTU and Path MTU -- 3.9 Tunneling Basics -- 3.10 Attacks on the Link Layer -- Chapter 4: ARP: Address Resolution Protocol -- 4.1 Introduction -- 4.2 An Example -- 4.3 ARP Cache -- 4.4 ARP Frame Format -- 4.5 ARP Examples -- 4.6 ARP Cache Timeout -- 4.7 Proxy ARP -- 4.8 Gratuitous ARP and Address Conflict Detection (ACD) -- 4.9 The arp Command -- 4.10 Using ARP to Set an Embedded Device's IPv4 Address -- 4.11 Attacks Involving ARP -- Chapter 5: The Internet Protocol (IP) -- 5.1 Introduction -- 5.2 IPv4 and IPv6 Headers -- 5.3 IPv6 Extension Headers -- 5.4 IP Forwarding -- 5.5 Mobile IP -- 5.6 Host Processing of IP Datagrams -- 5.7 Attacks Involving IP -- Chapter 6: System Configuration: DHCP and Autoconfiguration -- 6.1 Introduction -- 6.2 Dynamic Host Configuration Protocol (DHCP) -- 6.3 Stateless Address Autoconfiguration (SLAAC) -- 6.4 DHCP and DNS Interaction -- 6.5 PPP over Ethernet (PPPoE) -- 6.6 Attacks Involving System Configuration -- Chapter 7: Firewalls and Network Address Translation (NAT) -- 7.1 Introduction -- 7.2 Firewalls -- 7.3 Network Address Translation (NAT) -- 7.4 NAT Traversal -- 7.5 Configuring Packet-Filtering Firewalls and NATs -- 7.6 NAT for IPv4/IPv6 Coexistence and Transition -- 7.7 Attacks Involving Firewalls and NATs -- Chapter 8: ICMPv4 and ICMPv6: Internet Control Message Protocol -- 8.1 Introduction -- 8.2 ICMP Messages -- 8.3 ICMP Error Messages -- 8.4 ICMP Query/Informational Messages -- 8.5 Neighbor Discovery in IPv6 -- 8.6 Translating ICMPv4 and ICMPv6 -- 8.7 Attacks Involving ICMP.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 9: Broadcasting and Local Multicasting (IGMP and MLD) -- 9.1 Introduction -- 9.2 Broadcasting -- 9.3 Multicasting -- 9.4 The Internet Group Management Protocol (IGMP) and Multicast Listener Discovery Protocol (MLD) -- 9.5 Attacks Involving IGMP and MLD -- Chapter 10: User Datagram Protocol (UDP) and IP Fragmentation -- 10.1 Introduction -- 10.2 UDP Header -- 10.3 UDP Checksum -- 10.4 Examples -- 10.5 UDP and IPv6 -- 10.6 UDP-Lite -- 10.7 IP Fragmentation -- 10.8 Path MTU Discovery with UDP -- 10.9 Interaction between IP Fragmentation and ARP/ND -- 10.10 Maximum UDP Datagram Size -- 10.11 UDP Server Design -- 10.12 Translating UDP/IPv4 and UDP/IPv6 Datagrams -- 10.13 UDP in the Internet -- 10.14 Attacks Involving UDP and IP Fragmentation -- Chapter 11: Name Resolution and the Domain Name System (DNS) -- 11.1 Introduction -- 11.2 The DNS Name Space -- 11.3 Name Servers and Zones -- 11.4 Caching -- 11.5 The DNS Protocol -- 11.6 Sort Lists, Round-Robin, and Split DNS -- 11.7 Open DNS Servers and DynDNS -- 11.8 Transparency and Extensibility -- 11.9 Translating DNS from IPv4 to IPv6 (DNS64) -- 11.10 LLMNR and mDNS -- 11.11 LDAP -- 11.12 Attacks on the DNS -- Chapter 12: TCP: The Transmission Control Protocol (Preliminaries) -- 12.1 Introduction -- 12.2 Introduction to TCP -- 12.3 TCP Header and Encapsulation -- Chapter 13: TCP Connection Management -- 13.1 Introduction -- 13.2 TCP Connection Establishment and Termination -- 13.3 TCP Options -- 13.4 Path MTU Discovery with TCP -- 13.5 TCP State Transitions -- 13.6 Reset Segments -- 13.7 TCP Server Operation -- 13.8 Attacks Involving TCP Connection Management -- Chapter 14: TCP Timeout and Retransmission -- 14.1 Introduction -- 14.2 Simple Timeout and Retransmission Example -- 14.3 Setting the Retransmission Timeout (RTO) -- 14.4 Timer-Based Retransmission -- 14.5 Fast Retransmit -- 14.6 Retransmission with Selective Acknowledgments -- 14.7 Spurious Timeouts and Retransmissions -- 14.8 Packet Reordering and Duplication -- 14.9 Destination Metrics -- 14.10 Repacketization -- 14.11 Attacks Involving TCP Retransmission -- Chapter 15: TCP Data Flow and Window Management -- 15.1 Introduction -- 15.2 Interactive Communication -- 15.3 Delayed Acknowledgments -- 15.4 Nagle Algorithm -- 15.5 Flow Control and Window Management -- 15.6 Urgent Mechanism -- 15.7 Attacks Involving Window Management.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 16: TCP Congestion Control -- 16.1 Introduction -- 16.2 The Classic Algorithms -- 16.3 Evolution of the Standard Algorithms -- 16.4 Handling Spurious RTOs--the Eifel Response Algorithm -- 16.5 An Extended Example -- 16.6 Sharing Congestion State -- 16.7 TCP Friendliness -- 16.8 TCP in High-Speed Environments -- 16.9 Delay-Based Congestion Control -- 16.10 Buffer Bloat -- 16.11 Active Queue Management and ECN -- 16.12 Attacks Involving TCP Congestion Control -- Chapter 17: TCP Keepalive -- 17.1 Introduction -- 17.2 Description -- 17.3 Attacks Involving TCP Keepalives -- Chapter 18: Security: EAP, IPsec, TLS, DNSSEC, and DKIM -- 18.1 Introduction -- 18.2 Basic Principles of Information Security -- 18.3 Threats to Network Communication -- 18.4 Basic Cryptography and Security Mechanisms -- 18.5 Certificates, Certificate Authorities (CAs), and PKIs -- 18.6 TCP/IP Security Protocols and Layering -- 18.7 Network Access Control: 802.1X, 802.1AE, EAP, and PANA -- 18.8 Layer 3 IP Security (IPsec) -- 18.9 Transport Layer Security (TLS and DTLS) -- 18.10 DNS Security (DNSSEC) -- 18.11 DomainKeys Identified Mail (DKIM) -- 18.12 Attacks on Security Protocols.
520 ## - SUMMARY, ETC.
Summary, etc. "More than 162,000 networking professionals have relied on W. Richard Stevens' classic TCP/IP Illustrated, Volume 1 to gain the detailed understanding of TCP/IP they need to be effective. Now, the world's leading TCP/IP best-seller has been thoroughly updated to reflect a new generation of TCP/IP-based networking technologies. TCP/IP Illustrated, Volume 1, Second Edition doesn't just describe protocols: it enables readers to observe how these protocols operate under different conditions, using publicly available tools, and explains why key design decisions were made. The result: readers gain a deep understanding of how TCP/IP protocols function, and why they function that way.
520 ## - SUMMARY, ETC.
Summary, etc. Now thoroughly updated by long-time networking expert Kevin Fall, this brand-new second edition's extensive new coverage includes: Remote procedure call ; Identity management (access control / authentication); Network and transport layer security (authentication / privacy); File access protocols, including NFS and SMB/CIFS; Host initialization and DHCP; NAT and firewalls; E-mail; Web and web services; Wireless and wireless security and New tools, including Ethereal, nmap and netcat."--Pub. desc.
596 ## -
-- 1 2
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element TCP/IP (Computer network protocol)
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element TCP/IP (Computer network protocol)
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst01141584
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Stevens, W. Richard.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
994 ## -
-- Z0
-- SUPMU
948 ## - LOCAL PROCESSING INFORMATION (OCLC); SERIES PART DESIGNATOR (RLIN)
h (OCLC) NO HOLDINGS IN SUPMU - 9 OTHER HOLDINGS
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type Public note
          Female Library Female Library 04/18/2021   TK5105.55 .S74 2012 51952000318460 04/15/2021 1 04/15/2021 Books STACKS
          Main Library Main Library 04/18/2021   TK5105.55 .S74 2012 51952000318477 04/15/2021 1 04/15/2021 Books STACKS