Computer and information security handbook (Record no. 750)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04589cam a22003857a 4500 |
001 - CONTROL NUMBER | |
control field | 7898580 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OSts |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220701130122.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr n |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 091229s2009 ne a sb 001 0 eng d |
015 ## - NATIONAL BIBLIOGRAPHY NUMBER | |
National bibliography number | GBA938836 |
Source | bnb |
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER | |
Record control number | 015116339 |
Source | Uk |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780123743541 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0123743540 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (WaSeSS)ssj0000332153 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | YDXCP |
Transcribing agency | YDXCP |
Modifying agency | UKM |
-- | BWX |
-- | OCLCQ |
-- | COO |
-- | CDX |
-- | UNA |
-- | DLC |
-- | WaSeSS |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
Item number | C627 2009 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 VAC |
Edition number | 22 |
210 10 - ABBREVIATED TITLE | |
Abbreviated title | Computer and information security handbook |
245 00 - TITLE STATEMENT | |
Title | Computer and information security handbook |
Medium | [electronic resource] / |
Statement of responsibility, etc. | edited by John R. Vacca. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Amsterdam ; |
-- | Boston : |
Name of publisher, distributor, etc. | Elsevier ; |
Place of publication, distribution, etc. | Burlington, MA : |
Name of publisher, distributor, etc. | Morgan Kaufmann, |
Date of publication, distribution, etc. | c2009. |
490 0# - SERIES STATEMENT | |
Series statement | The Morgan Kaufmann series in computer security |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes bibliographical references and index. |
505 00 - FORMATTED CONTENTS NOTE | |
Title | Overview of system and network security : a comprehensive introduction / |
Statement of responsibility | John Mallery -- |
Title | A cryptography primer / |
Statement of responsibility | Scott R. Ellis -- |
Title | Preventing system intrusions / |
Statement of responsibility | Michael West -- |
Title | Guarding against network intrusions / |
Statement of responsibility | Tom Chen and Patrick J. Walsh -- |
Title | Unix and Linux security / |
Statement of responsibility | Gerald Beuchelt -- |
Title | Eliminating the security weakness of Linux and Unix operating systems / |
Statement of responsibility | Mario Santana -- |
Title | Internet security / |
Statement of responsibility | Jesse Walker -- |
Title | The botnet problem / |
Statement of responsibility | Xinyuan Wang and Daniel ramsbrock -- |
Title | Intranet security / |
Statement of responsibility | Bill Mansoor -- |
Title | Local area network security / |
Statement of responsibility | Pramod Pandya -- |
Title | Wireless network security / |
Statement of responsibility | Chunming Rong and Erdal Cayirci -- |
Title | Cellular network security / |
Statement of responsibility | Peng Liu, Thomas F. LaPorta and Kameswari Kotapati -- |
Title | RFID security / |
Statement of responsibility | Chunming Rong and Erdal Cayirci -- |
Title | Information security essentials for IT managers, protecting mission-critical systems / |
Statement of responsibility | Albert Caballero -- |
Title | Security management systems / |
Statement of responsibility | Joe Wright and Jim Harmening -- |
Title | Information technology security management / |
Statement of responsibility | Rahul Bhasker and Bhushan Kapoor -- |
Title | Identity management / |
Statement of responsibility | Jean-Marc Seigneur and Tewfiq El Malika -- |
Title | Intrusion prevention and detection systems / |
Statement of responsibility | Christopher Day -- |
Title | Computer forensics / |
Statement of responsibility | Scott R. Ellis -- |
Title | Network forensics / |
Statement of responsibility | Yong Guan -- |
Title | Firewalls / |
Statement of responsibility | Errin W. Fulp -- |
Title | Penetration testing / |
Statement of responsibility | Sanjay Bavisi -- |
Title | What is vulnerability assessment? / |
Statement of responsibility | Almantas Kakareka -- |
Title | Data encryption / |
Statement of responsibility | Bhushan Kapoor and Pramod Pandya -- |
Title | Satellite encryption / |
Statement of responsibility | Daniel S. Soper -- |
Title | Public key infrastructure / |
Statement of responsibility | Terence Spies -- |
Title | Instant-messaging security / |
Statement of responsibility | Samuel J.J. Curry -- |
Title | NET privacy / |
Statement of responsibility | Marco Cremonini, Chiara Braghin and Claudio Agostino Ardagna -- |
Title | Personal privacy policies / |
Statement of responsibility | George Yee and Larry Korba -- |
Title | Virtual private networks / |
Statement of responsibility | Jim Harmening and Joe Wright -- |
Title | Identity theft / |
Statement of responsibility | Markus Jacobsson and Alex Tsow -- |
Title | VoIP security / |
Statement of responsibility | Dan Wing and Harsh Kupwade Patil -- |
Title | SAN security / |
Statement of responsibility | John McGowan, Jeffrey Bardin and John McDonald -- |
Title | Storage area networking devices security / |
Statement of responsibility | Robert Rounsavall -- |
Title | Risk management / |
Statement of responsibility | Sokratis K. Katsikas -- |
Title | Physical security essentials / |
Statement of responsibility | William Stallings -- |
Title | Biometrics / |
Statement of responsibility | Luther Martin -- |
Title | Homeland security / |
Statement of responsibility | Rahul Bhaskar and Bhushan Kapoor -- |
Title | Information warfare / |
Statement of responsibility | Jan Eloff and Anna Granova -- |
Title | Security through diversity / |
Statement of responsibility | Kevin Noble -- |
Title | Reputation management / |
Statement of responsibility | Jean-Marc Seigneur -- |
Title | Content filtering / |
Statement of responsibility | Peter Nicoletti -- |
Title | Data loss protection / |
Statement of responsibility | Ken Perkins -- |
Miscellaneous information | Appendix A: |
Title | Configuring authentication service on Microsoft Windows Vista / |
Statement of responsibility | John R. Vacca -- |
Miscellaneous information | Appendix B: |
Title | Security management and resiliency / |
Statement of responsibility | John R. Vacca -- |
Miscellaneous information | Appendix C: |
Title | List of top security implementation and deployment companies -- |
Miscellaneous information | Appendix D: |
Title | List of security products -- |
Miscellaneous information | Appendix E: |
Title | List of security standards -- |
Miscellaneous information | Appendix F: |
Title | List of miscellaneous security resources -- |
Miscellaneous information | Appendix G: |
Title | Ensuring built-in frequency hopping spread spectrum wireless network security -- |
Miscellaneous information | Appendix H: |
Title | Configuring wireless internet security remote access -- |
Miscellaneous information | Appendix I: |
Title | Frequently asked questions -- |
Miscellaneous information | Appendix J: Glossary. |
506 ## - RESTRICTIONS ON ACCESS NOTE | |
Terms governing access | License restrictions may limit access. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks |
General subdivision | Security measures. |
9 (RLIN) | 9091 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Vacca, John R. |
9 (RLIN) | 9092 |
773 #0 - HOST ITEM ENTRY | |
Title | Safari Technical Books (Current File) (Legacy Platform) |
773 #0 - HOST ITEM ENTRY | |
Title | Referex Computing |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="http://www.columbia.edu/cgi-bin/cul/resolve?clio7898580.001">http://www.columbia.edu/cgi-bin/cul/resolve?clio7898580.001</a> |
Public note | Full text available from Referex Computing |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="http://www.columbia.edu/cgi-bin/cul/resolve?clio7898580.002">http://www.columbia.edu/cgi-bin/cul/resolve?clio7898580.002</a> |
Public note | Full text available from Safari Technical Books (Current File) (Legacy Platform) |
910 ## - USER-OPTION DATA (OCLC) | |
User-option data | Library of Congress record |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Books |
No items available.