Computer and information security handbook / (Record no. 1893)

MARC details
000 -LEADER
fixed length control field 07924cam a22003014i 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250714105114.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field ta
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 160829s2017 maua b 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780128038437 (hardbound)
040 ## - CATALOGING SOURCE
Original cataloging agency YDX
Language of cataloging eng
Transcribing agency YDX
Description conventions rda
Modifying agency HEBIS
-- OCLCO
-- MNY
-- WAU
-- OCLCF
-- DLC
-- TUPM
050 #0 - LIBRARY OF CONGRESS CALL NUMBER
Classification number R QA 76.9 A25
Item number C66 2017
245 00 - TITLE STATEMENT
Title Computer and information security handbook /
Statement of responsibility, etc. edited by John R. Vacca.
250 ## - EDITION STATEMENT
Edition statement Third edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Cambridge, MA :
Name of producer, publisher, distributor, manufacturer Morgan Kaufmann Publishers, an imprint of Elsevier
Date of production, publication, distribution, manufacture, or copyright notice c2017.
300 ## - PHYSICAL DESCRIPTION
Extent xli, 1237 pages :
Other physical details illustrations ;
Dimensions 28 cm.
336 ## - CONTENT TYPE
Content type term text
Source rdacontent.
337 ## - MEDIA TYPE
Media type term unmediated
Source rdamedia.
338 ## - CARRIER TYPE
Carrier type term volume
Source rdacarrier.
500 ## - GENERAL NOTE
General note Part I. Overview of system and network security: a comprehensive introduction -- 1. Information security in the modern world / James Pooley -- 2. Building a secure organization / John R. Mallery -- 3. A cryptography primer / Scott R. Ellis -- 4. Verifying user and host identity / Keith Lewis -- 5. Detecting system intrusions / Scott R. Ellis -- 6. Intrusion detection in contemporary environments / Tarfa Hamed, Rozita Dara, Stefan C. Kremer -- 7. Preventing systems intrusions / Michael A. West -- 8. Guarding against network intrusions / Thomas M. Chen -- 9. Fault tolerance and resilience in cloud computing environments / Ravi Jhawar, Vincenzo Piuri -- 10. Securing web applications, services, and servers / Gerald Beuchelt -- 11. UNIX and Linux security / Gerald Beuchelt -- 12. Eliminating security weakness of Linux and UNIX operating systems / Mario Santana -- 13. Internet security / Jesse Walker -- 14. The botnet problem / Nailah Mims -- 15. Intranet security / Bill Mansoor -- 16. Local area network security (online chapter) / Pramod Pandya -- 17. Wireless network security / Chunming Rong, Gansen Zhao, Liang Yan, Erdal Cayirci, Hongbing Cheng -- 18. Wireless sensor network security: the internet of things / Harsh Kupwade Patil, Thomas M. Chen -- 19. Security for the internet of things / William Stallings -- 20. Cellular network security / Peng Liu, Thomas F. LaPorta, Kameswari Kotapati -- 21. Radio frequency identification security / Chunming Rong, Gansen Zhao, Liang Yan, Erdal Cayirci, Hongbing Cheng -- 22. Optical network security (online chapter) / Lauren Collins -- 23. Optical wireless security (online chapter) / Scott R. Ellis -- Part II. Managing information security -- 24. Information security essentials for information technology managers: protecting mission-critical systems / Albert Caballero -- 25. Security management systems / Jim Harmening -- 26. Policy-driven system management / Henrik Plate, Cataldo Basile, Stefano Paraboschi -- 27. Information technology security management (online chapter) / Rahul Bhaskar, Bhushan Kapoor -- 28. The enemy (the intruder's genesis) (online chapter) / Pramod Pandya -- 29. Social engineering deceptions and defenses / Scott R. Ellis -- 30. Ethical hacking / Scott R. Ellis -- 31. What is vulnerability assessment? / Almantas Kakareka -- 32. Security metrics: an introduction and literature review (online chapter) / George O.M. Yee -- 33. Security education, training, and awareness / Albert Caballero -- 34. Risk management / Sokratis K. Katsikas -- 35. Insider threat / William F. Gross -- Part III. Disaster recovery security -- 36. Disaster recovery / Scott R. Ellis, Lauren Collins -- 37. Disaster recovery plans for small and medium businesses (SMBs) / William F. Gross, Jr. -- Part IV. Security standards and policies -- 38. Security certification and standards implementation / Keith Lewis -- 39. Security policies and plans development / Keith Lewis -- Part V. Cyber, network, and systems forensics security and assurance -- 40. Cyber forensics / Scott R. Ellis -- 41. Cyber forensics and incidence response / Cem Gurkok -- 42. Securing e-discovery / Scott R. Ellis -- 43. Network forensics (online chapter) / Yong Guan -- 44. Microsoft Office and metadata forensics: a deeper dive / Rich Hoffman -- 45. Hard drive imaging / John Benjamin Khan -- Part VI. Encryption technology -- 46. Data encryption (online chapter) / Bhushan Kapoor, Pramod Pandya -- 47. Satellite encryption / Daniel S. Soper -- 48. Public key infrastructure / Terence Spies -- 49. Password-based authenticated key establishment protocols (online chapter) / Jean Lancrenon, Dalia Khader, Peter Y.A. Ryan, Feng Hao -- 50. Context-aware multifactor authentication survey / Emin Huseynov, Jean-Marc Seigneur -- 51. Instant-messaging security / Samuel J.J. Curry -- Part VII. Privacy and access management -- 52. Online privacy / Chiara Braghin, Marco Cremonini -- 53. Privacy-enhancing technologies / Simone Fischer-Hbner, Stevan Berthold -- 54. Personal privacy policies (online chapter) / George O.M. Yee, Larry Korba -- 55. Detection of conflicts in security policies / Cataldo Basile, Matteo Maria Casalino, Simone Mutti, Stefano Paraboschi -- 56. Supporting user privacy preferences in digital interactions / Sara Foresti, Pierangela Samarati -- 57. Privacy and security environmental monitoring systems: issues and solutions / Sabrina De Capitani di Vimercati, Angelo Genovese, Giovanni Livraga, Vincenzo Piuri, Fabio Scotti -- 58. Virtual private networks / James T. Harmening -- 59. Identity theft (online chapter) / Markus Jakobsson, Alex Tsow -- Part VIII. Storage security -- 61. SAN security (online chapter) / John McGowan, Jeffrey S. Bardin, John McDonald -- 62. Storage area networking security devices / Robert Rounsavall -- Part IX. Cloud security -- 63. Securing cloud computing systems / Cem Gurkok -- 64. Cloud security / Edward G. Amoroso -- 65. Private cloud security / Keith Lewis -- 66. Virtual private cloud security / Keith Lewis -- Part X. Virtual security -- 67. Protecting virtual infrastructure / Edward G. Amoroso -- 68. Software-defined networking and network function virtualization security / Edward G. Amoroso -- Part XI. Cyber physical security -- 69. Physical security essentials / William Stallings -- 70. Biometrics (online chapter) / Luther Martin -- Part XII. Practical security -- 71. Online identity and user management services / Tewfiq El Maliki, Jean-Marc Seigneur -- 72. Intrusion prevention and detection systems / Christopher Day -- 73. Transmission control protocol/internet protocol packet analysis (online chapter) / Pramod Pandya -- 74. Firewalls (online chapter) / Errin W. Fulp -- 75. Penetration testing / Roman Zabicki, Scott R. Ellis -- 76. System security (online chapter) / Lauren Collins -- 77. Access controls / Lauren Collins -- 78. Endpoint security / Keith Lewis -- 79. Assessments and audits (online chapter) / Lauren Collins -- 80. Fundamentals of cryptography / Scott R. Ellis -- Part XIII. Critical infrastructure security -- 81. Securing the infrastructure / Lauren Collins -- 82. Homeland security (online chapter) / Rahul Bhaskar, Bhushan Kapoor -- 83. Cyber warfare / Anna Granova, Marco Slaviero -- 84. Cyber-attack process / Nailah Mims -- Part XIV. Advanced security -- 85. Security through diversity / Kevin Noble -- 86. e-Reputation management and online reputation management survey / Jean-Marc Seigneur -- 87. Content filtering (online chapter) / Pete F. Nicoletti -- 88. Data loss protection / Ken Perkins -- 89. Satellite cyber attack search and destroy / Jeffrey Bardin -- 90. Verifiable voting systems (online chapter) / Thea Peacock, Peter Y.A. Ryan, Steve Schneider, Zhe Xia -- 91. Advanced data encryption / Pramod Pandya.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc. This comprehensive reference on computer security offers deep coverage of a wide range of issues in computer and cyber security theory, applications, and best practices.--
650 10 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 10 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
650 10 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Vacca, John R.,
Relator term editor.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Inventory number Total checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Library of Congress Classification     TUP Manila Library TUP Manila Library General Reference Section-GF Mezzanine 09/20/2020 Fund 164 32483   R QA 76.9 A25 C66 2017 P00032483 08/15/2023 c.1 03/10/2022 Book



© 2025 Technological University of the Philippines.
All Rights Reserved.

Powered by Koha