MARC details
| 000 -LEADER |
| fixed length control field |
07924cam a22003014i 4500 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20250714105114.0 |
| 007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
| fixed length control field |
ta |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
160829s2017 maua b 001 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9780128038437 (hardbound) |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
YDX |
| Language of cataloging |
eng |
| Transcribing agency |
YDX |
| Description conventions |
rda |
| Modifying agency |
HEBIS |
| -- |
OCLCO |
| -- |
MNY |
| -- |
WAU |
| -- |
OCLCF |
| -- |
DLC |
| -- |
TUPM |
| 050 #0 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
R QA 76.9 A25 |
| Item number |
C66 2017 |
| 245 00 - TITLE STATEMENT |
| Title |
Computer and information security handbook / |
| Statement of responsibility, etc. |
edited by John R. Vacca. |
| 250 ## - EDITION STATEMENT |
| Edition statement |
Third edition. |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Place of production, publication, distribution, manufacture |
Cambridge, MA : |
| Name of producer, publisher, distributor, manufacturer |
Morgan Kaufmann Publishers, an imprint of Elsevier |
| Date of production, publication, distribution, manufacture, or copyright notice |
c2017. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xli, 1237 pages : |
| Other physical details |
illustrations ; |
| Dimensions |
28 cm. |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Source |
rdacontent. |
| 337 ## - MEDIA TYPE |
| Media type term |
unmediated |
| Source |
rdamedia. |
| 338 ## - CARRIER TYPE |
| Carrier type term |
volume |
| Source |
rdacarrier. |
| 500 ## - GENERAL NOTE |
| General note |
Part I. Overview of system and network security: a comprehensive introduction -- 1. Information security in the modern world / James Pooley -- 2. Building a secure organization / John R. Mallery -- 3. A cryptography primer / Scott R. Ellis -- 4. Verifying user and host identity / Keith Lewis -- 5. Detecting system intrusions / Scott R. Ellis -- 6. Intrusion detection in contemporary environments / Tarfa Hamed, Rozita Dara, Stefan C. Kremer -- 7. Preventing systems intrusions / Michael A. West -- 8. Guarding against network intrusions / Thomas M. Chen -- 9. Fault tolerance and resilience in cloud computing environments / Ravi Jhawar, Vincenzo Piuri -- 10. Securing web applications, services, and servers / Gerald Beuchelt -- 11. UNIX and Linux security / Gerald Beuchelt -- 12. Eliminating security weakness of Linux and UNIX operating systems / Mario Santana -- 13. Internet security / Jesse Walker -- 14. The botnet problem / Nailah Mims -- 15. Intranet security / Bill Mansoor -- 16. Local area network security (online chapter) / Pramod Pandya -- 17. Wireless network security / Chunming Rong, Gansen Zhao, Liang Yan, Erdal Cayirci, Hongbing Cheng -- 18. Wireless sensor network security: the internet of things / Harsh Kupwade Patil, Thomas M. Chen -- 19. Security for the internet of things / William Stallings -- 20. Cellular network security / Peng Liu, Thomas F. LaPorta, Kameswari Kotapati -- 21. Radio frequency identification security / Chunming Rong, Gansen Zhao, Liang Yan, Erdal Cayirci, Hongbing Cheng -- 22. Optical network security (online chapter) / Lauren Collins -- 23. Optical wireless security (online chapter) / Scott R. Ellis -- Part II. Managing information security -- 24. Information security essentials for information technology managers: protecting mission-critical systems / Albert Caballero -- 25. Security management systems / Jim Harmening -- 26. Policy-driven system management / Henrik Plate, Cataldo Basile, Stefano Paraboschi -- 27. Information technology security management (online chapter) / Rahul Bhaskar, Bhushan Kapoor -- 28. The enemy (the intruder's genesis) (online chapter) / Pramod Pandya -- 29. Social engineering deceptions and defenses / Scott R. Ellis -- 30. Ethical hacking / Scott R. Ellis -- 31. What is vulnerability assessment? / Almantas Kakareka -- 32. Security metrics: an introduction and literature review (online chapter) / George O.M. Yee -- 33. Security education, training, and awareness / Albert Caballero -- 34. Risk management / Sokratis K. Katsikas -- 35. Insider threat / William F. Gross -- Part III. Disaster recovery security -- 36. Disaster recovery / Scott R. Ellis, Lauren Collins -- 37. Disaster recovery plans for small and medium businesses (SMBs) / William F. Gross, Jr. -- Part IV. Security standards and policies -- 38. Security certification and standards implementation / Keith Lewis -- 39. Security policies and plans development / Keith Lewis -- Part V. Cyber, network, and systems forensics security and assurance -- 40. Cyber forensics / Scott R. Ellis -- 41. Cyber forensics and incidence response / Cem Gurkok -- 42. Securing e-discovery / Scott R. Ellis -- 43. Network forensics (online chapter) / Yong Guan -- 44. Microsoft Office and metadata forensics: a deeper dive / Rich Hoffman -- 45. Hard drive imaging / John Benjamin Khan -- Part VI. Encryption technology -- 46. Data encryption (online chapter) / Bhushan Kapoor, Pramod Pandya -- 47. Satellite encryption / Daniel S. Soper -- 48. Public key infrastructure / Terence Spies -- 49. Password-based authenticated key establishment protocols (online chapter) / Jean Lancrenon, Dalia Khader, Peter Y.A. Ryan, Feng Hao -- 50. Context-aware multifactor authentication survey / Emin Huseynov, Jean-Marc Seigneur -- 51. Instant-messaging security / Samuel J.J. Curry -- Part VII. Privacy and access management -- 52. Online privacy / Chiara Braghin, Marco Cremonini -- 53. Privacy-enhancing technologies / Simone Fischer-Hbner, Stevan Berthold -- 54. Personal privacy policies (online chapter) / George O.M. Yee, Larry Korba -- 55. Detection of conflicts in security policies / Cataldo Basile, Matteo Maria Casalino, Simone Mutti, Stefano Paraboschi -- 56. Supporting user privacy preferences in digital interactions / Sara Foresti, Pierangela Samarati -- 57. Privacy and security environmental monitoring systems: issues and solutions / Sabrina De Capitani di Vimercati, Angelo Genovese, Giovanni Livraga, Vincenzo Piuri, Fabio Scotti -- 58. Virtual private networks / James T. Harmening -- 59. Identity theft (online chapter) / Markus Jakobsson, Alex Tsow -- Part VIII. Storage security -- 61. SAN security (online chapter) / John McGowan, Jeffrey S. Bardin, John McDonald -- 62. Storage area networking security devices / Robert Rounsavall -- Part IX. Cloud security -- 63. Securing cloud computing systems / Cem Gurkok -- 64. Cloud security / Edward G. Amoroso -- 65. Private cloud security / Keith Lewis -- 66. Virtual private cloud security / Keith Lewis -- Part X. Virtual security -- 67. Protecting virtual infrastructure / Edward G. Amoroso -- 68. Software-defined networking and network function virtualization security / Edward G. Amoroso -- Part XI. Cyber physical security -- 69. Physical security essentials / William Stallings -- 70. Biometrics (online chapter) / Luther Martin -- Part XII. Practical security -- 71. Online identity and user management services / Tewfiq El Maliki, Jean-Marc Seigneur -- 72. Intrusion prevention and detection systems / Christopher Day -- 73. Transmission control protocol/internet protocol packet analysis (online chapter) / Pramod Pandya -- 74. Firewalls (online chapter) / Errin W. Fulp -- 75. Penetration testing / Roman Zabicki, Scott R. Ellis -- 76. System security (online chapter) / Lauren Collins -- 77. Access controls / Lauren Collins -- 78. Endpoint security / Keith Lewis -- 79. Assessments and audits (online chapter) / Lauren Collins -- 80. Fundamentals of cryptography / Scott R. Ellis -- Part XIII. Critical infrastructure security -- 81. Securing the infrastructure / Lauren Collins -- 82. Homeland security (online chapter) / Rahul Bhaskar, Bhushan Kapoor -- 83. Cyber warfare / Anna Granova, Marco Slaviero -- 84. Cyber-attack process / Nailah Mims -- Part XIV. Advanced security -- 85. Security through diversity / Kevin Noble -- 86. e-Reputation management and online reputation management survey / Jean-Marc Seigneur -- 87. Content filtering (online chapter) / Pete F. Nicoletti -- 88. Data loss protection / Ken Perkins -- 89. Satellite cyber attack search and destroy / Jeffrey Bardin -- 90. Verifiable voting systems (online chapter) / Thea Peacock, Peter Y.A. Ryan, Steve Schneider, Zhe Xia -- 91. Advanced data encryption / Pramod Pandya. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc. note |
Includes bibliographical references and index. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
This comprehensive reference on computer security offers deep coverage of a wide range of issues in computer and cyber security theory, applications, and best practices.-- |
| 650 10 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer security. |
| 650 10 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer networks |
| General subdivision |
Security measures. |
| 650 10 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Data protection. |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Vacca, John R., |
| Relator term |
editor. |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Library of Congress Classification |
| Koha item type |
Book |