Security Architecture of Common IT Platforms / (Record no. 911)

MARC details
000 -LEADER
fixed length control field 02076nam a22002417a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210226140952.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210209b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780536903624
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 053690362-x
040 ## - CATALOGING SOURCE
Original cataloging agency BUL
Transcribing agency BUL
Modifying agency BUL
Language of cataloging eng
Description conventions rda
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 22
Classification number 004.22
Item number SEC
245 ## - TITLE STATEMENT
Title Security Architecture of Common IT Platforms /
Statement of responsibility, etc. Pearson custom.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boston :
Name of publisher, distributor, etc. Pearson Custom Publishing
Date of publication, distribution, etc. c2005.
300 ## - PHYSICAL DESCRIPTION
Extent x,( various pages) :
Other physical details ill. ;
Dimensions 25 cm.
500 ## - GENERAL NOTE
General note Chapter 1: Architecture Reviews and Security Assessment<br/>1.1 Network Architecture and Security<br/>1.2 Securing the Network Design<br/>1.3 Network Management<br/>1.4 Secure Architectural Patterns, etc.<br/><br/>Chapter 2: Communications and Network Security<br/>2.1 Introduction<br/>2.2 Architecture of a Switch<br/>2.3 Securing Switches and Routers<br/>2.4 Routing in Communication Protocols, etc.<br/><br/>Chapter 3: Router Security<br/>3.1 Router Security-An Overview<br/>3.2 Security Features of Routers<br/><br/>Chapter 4; Operating System Security--An Overview<br/>4.1 Operating System-Architecture<br/>4.2 Accounts<br/>4.3 Groups<br/>4.4 Policies<br/><br/>Chapter 5: Operating System Security--Advanced Study<br/>5.1 Introduction<br/>5.2 Authentication<br/>5.3 Access Control<br/>5.4 Auditing, etc.<br/><br/>Chapter 6: Database Security<br/>6.1 Database: An Overview<br/>6.2 Databases: Security Features<br/>6.3 Databases: Advanced Security Features<br/><br/>Chapter 7: Web Server Security<br/>7.1 Introduction<br/>7.2 Architecture of a Web Server<br/>7.3 Web Server Security Concepts, etc.<br/><br/>Chapter 8: Application Layer Security<br/>8.1 Application Layer<br/>8.2 Security of Applications<br/>8.3 Application Layer Security, etc<br/><br/>Chapter 9: Security in Business Applications<br/>9.1 Business Function Application<br/>9.2 ERP Applications<br/>
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes index
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Network security
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Operating system
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Router security
710 ## - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element Pearson Custom
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book Open Access
Classification part 004.22
Item part 1
Call number prefix SEC
Call number suffix 004.22 SEC
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Engineering Library Engineering Library 02/09/2021 Purchase   004.22 SEC 1 0010250 02/09/2021 1 02/09/2021 Book Open Access