MARC details
000 -LEADER |
fixed length control field |
02117cam a22002897i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240114092305.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
160829t20172017maua b 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780128038437 |
Qualifying information |
(hardcover) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0128038438 |
Qualifying information |
(hardcover) |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
BUL |
Transcribing agency |
BUL |
Modifying agency |
BUL |
Language of cataloging |
eng |
Description conventions |
rda |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
Item number |
COM |
245 00 - TITLE STATEMENT |
Title |
Computer and information security handbook / |
Statement of responsibility, etc. |
edited by John R. Vacca. |
250 ## - EDITION STATEMENT |
Edition statement |
3rd edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Massachusetts : |
Name of producer, publisher, distributor, manufacturer |
Morgan Kaufmann Publishers, an imprint of Elsevier, |
Date of production, publication, distribution, manufacture, or copyright notice |
©2017 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xli, 1237 p. : |
Other physical details |
ill. ; |
Dimensions |
29 cm |
500 ## - GENERAL NOTE |
General note |
<br/>CONTENTS<br/><br/>PART I. OVERVIEW OF SYSTEM AND NETWORK SECURITY: A COMPREHESIVE INTRODUCTION <br/>1. Information security in modern enterprise<br/>2. Building a secure organization<br/>3. A cryptography primer<br/>4. Verifying user and host identity<br/>5. Detecting system intrusions<br/>6. Intrusion detection in contemporary environments<br/>7. Preventing system intrusions<br/>8. Guarding against network intrusions<br/>9. Fault tolerance and resilience in cloud computing environment<br/>10. Securing web applications, services, and servers<br/>11. UNIX and Linux security<br/>12. Eliminating the security weakness of Linux and UNIX operating systems<br/>13. Internet security<br/>14. The Botnet problem<br/>15. Intranet security<br/>16. Local area network security<br/>17. Wireless network security<br/>18. Wireless sensor network security: The internet of things<br/>19. Security for the internet of things<br/>20. Cellular network security<br/>21. Radio frequency identification security<br/>22. Optical network security<br/>23. Optical wireless security<br/>etc...<br/><br/> |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index P. 1197-1237 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Data protection. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Informations system |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Vacca, John R., |
856 41 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Online chapters |
Uniform Resource Identifier |
<a href="https://www.elsevier.com/books-and-journals/book-companion/9780128038437">https://www.elsevier.com/books-and-journals/book-companion/9780128038437</a> |
Link text |
Click here to access online chapters. |
Public note |
Link valid as of 2017-09-20. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Book Closed Access |
Edition |
3rd edition |
Classification part |
005.8 |
Item part |
1 |
Call number prefix |
COM |
Call number suffix |
005.8 COM |