Computer and information security handbook / (Record no. 530)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 08713nam a22004457a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | GSU |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240919170508.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 170724t20172017maua b 001 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
LC control number | 2016952601 |
015 ## - NATIONAL BIBLIOGRAPHY NUMBER | |
National bibliography number | GBB785642 |
Source | bnb |
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER | |
Record control number | CAT31381658 |
Source | DNAL |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | 1381658 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)966205097 |
Canceled/invalid control number | (OCoLC)1124784702 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | LCC |
Language of cataloging | eng |
Description conventions | rda |
Transcribing agency | GSU |
Modifying agency | HEBIS |
-- | OCLCO |
-- | MNY |
-- | WAU |
-- | OCLCF |
-- | OCLCA |
-- | DLC |
-- | AGL |
-- | OCLCA |
-- | UKMGB |
-- | THHCU |
-- | OCLCA |
-- | PHCSB |
-- | PGC |
-- | GSU |
049 ## - LOCAL HOLDINGS (OCLC) | |
Holding library | AGLL |
050 10 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
Item number | C627 2017 |
070 0# - NATIONAL AGRICULTURAL LIBRARY CALL NUMBER | |
Classification number | QA76.9.A25 |
Item number | C627 2017 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Vacca, John R., |
Relator term | editor |
245 00 - TITLE STATEMENT | |
Title | Computer and information security handbook / |
Statement of responsibility, etc. | edited by John R. Vacca. |
250 ## - EDITION STATEMENT | |
Edition statement | Third edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Cambridge, MA : |
Name of producer, publisher, distributor, manufacturer | Morgan Kaufmann Publishers, an imprint of Elsevier, |
Date of production, publication, distribution, manufacture, or copyright notice | [2017] |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Date of production, publication, distribution, manufacture, or copyright notice | �2017 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xli, 1237 pages : |
Other physical details | illustrations ; |
Dimensions | 28 cm |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | unmediated |
Media type code | n |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | volume |
Carrier type code | nc |
Source | rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Part I. Overview of system and network security: a comprehensive introduction -- 1. Information security in the modern world / James Pooley -- 2. Building a secure organization / John R. Mallery -- 3. A cryptography primer / Scott R. Ellis -- 4. Verifying user and host identity / Keith Lewis -- 5. Detecting system intrusions / Scott R. Ellis -- 6. Intrusion detection in contemporary environments / Tarfa Hamed, Rozita Dara, Stefan C. Kremer -- 7. Preventing systems intrusions / Michael A. West -- 8. Guarding against network intrusions / Thomas M. Chen -- 9. Fault tolerance and resilience in cloud computing environments / Ravi Jhawar, Vincenzo Piuri -- 10. Securing web applications, services, and servers / Gerald Beuchelt -- 11. UNIX and Linux security / Gerald Beuchelt -- 12. Eliminating security weakness of Linux and UNIX operating systems / Mario Santana -- 13. Internet security / Jesse Walker -- 14. The botnet problem / Nailah Mims -- 15. Intranet security / Bill Mansoor -- 16. Local area network security (online chapter) / Pramod Pandya -- 17. Wireless network security / Chunming Rong, Gansen Zhao, Liang Yan, Erdal Cayirci, Hongbing Cheng -- 18. Wireless sensor network security: the internet of things / Harsh Kupwade Patil, Thomas M. Chen -- 19. Security for the internet of things / William Stallings -- 20. Cellular network security / Peng Liu, Thomas F. LaPorta, Kameswari Kotapati -- 21. Radio frequency identification security / Chunming Rong, Gansen Zhao, Liang Yan, Erdal Cayirci, Hongbing Cheng -- 22. Optical network security (online chapter) / Lauren Collins -- 23. Optical wireless security (online chapter) / Scott R. Ellis -- Part II. Managing information security -- 24. Information security essentials for information technology managers: protecting mission-critical systems / Albert Caballero -- 25. Security management systems / Jim Harmening -- 26. Policy-driven system management / Henrik Plate, Cataldo Basile, Stefano Paraboschi -- 27. Information technology security management (online chapter) / Rahul Bhaskar, Bhushan Kapoor -- 28. The enemy (the intruder's genesis) (online chapter) / Pramod Pandya -- 29. Social engineering deceptions and defenses / Scott R. Ellis -- 30. Ethical hacking / Scott R. Ellis -- 31. What is vulnerability assessment? / Almantas Kakareka -- 32. Security metrics: an introduction and literature review (online chapter) / George O.M. Yee -- 33. Security education, training, and awareness / Albert Caballero -- 34. Risk management / Sokratis K. Katsikas -- 35. Insider threat / William F. Gross -- Part III. Disaster recovery security -- 36. Disaster recovery / Scott R. Ellis, Lauren Collins -- 37. Disaster recovery plans for small and medium businesses (SMBs) / William F. Gross, Jr. -- Part IV. Security standards and policies -- 38. Security certification and standards implementation / Keith Lewis -- 39. Security policies and plans development / Keith Lewis -- Part V. Cyber, network, and systems forensics security and assurance -- 40. Cyber forensics / Scott R. Ellis -- 41. Cyber forensics and incidence response / Cem Gurkok -- 42. Securing e-discovery / Scott R. Ellis -- 43. Network forensics (online chapter) / Yong Guan -- 44. Microsoft Office and metadata forensics: a deeper dive / Rich Hoffman -- 45. Hard drive imaging / John Benjamin Khan -- Part VI. Encryption technology -- 46. Data encryption (online chapter) / Bhushan Kapoor, Pramod Pandya -- 47. Satellite encryption / Daniel S. Soper -- 48. Public key infrastructure / Terence Spies -- 49. Password-based authenticated key establishment protocols (online chapter) / Jean Lancrenon, Dalia Khader, Peter Y.A. Ryan, Feng Hao -- 50. Context-aware multifactor authentication survey / Emin Huseynov, Jean-Marc Seigneur -- 51. Instant-messaging security / Samuel J.J. Curry -- Part VII. Privacy and access management -- 52. Online privacy / Chiara Braghin, Marco Cremonini -- 53. Privacy-enhancing technologies / Simone Fischer-Hbner, Stevan Berthold -- 54. Personal privacy policies (online chapter) / George O.M. Yee, Larry Korba -- 55. Detection of conflicts in security policies / Cataldo Basile, Matteo Maria Casalino, Simone Mutti, Stefano Paraboschi -- 56. Supporting user privacy preferences in digital interactions / Sara Foresti, Pierangela Samarati -- 57. Privacy and security environmental monitoring systems: issues and solutions / Sabrina De Capitani di Vimercati, Angelo Genovese, Giovanni Livraga, Vincenzo Piuri, Fabio Scotti -- 58. Virtual private networks / James T. Harmening -- 59. Identity theft (online chapter) / Markus Jakobsson, Alex Tsow -- Part VIII. Storage security -- 61. SAN security (online chapter) / John McGowan, Jeffrey S. Bardin, John McDonald -- 62. Storage area networking security devices / Robert Rounsavall -- Part IX. Cloud security -- 63. Securing cloud computing systems / Cem Gurkok -- 64. Cloud security / Edward G. Amoroso -- 65. Private cloud security / Keith Lewis -- 66. Virtual private cloud security / Keith Lewis -- Part X. Virtual security -- 67. Protecting virtual infrastructure / Edward G. Amoroso -- 68. Software-defined networking and network function virtualization security / Edward G. Amoroso -- Part XI. Cyber physical security -- 69. Physical security essentials / William Stallings -- 70. Biometrics (online chapter) / Luther Martin -- Part XII. Practical security -- 71. Online identity and user management services / Tewfiq El Maliki, Jean-Marc Seigneur -- 72. Intrusion prevention and detection systems / Christopher Day -- 73. Transmission control protocol/internet protocol packet analysis (online chapter) / Pramod Pandya -- 74. Firewalls (online chapter) / Errin W. Fulp -- 75. Penetration testing / Roman Zabicki, Scott R. Ellis -- 76. System security (online chapter) / Lauren Collins -- 77. Access controls / Lauren Collins -- 78. Endpoint security / Keith Lewis -- 79. Assessments and audits (online chapter) / Lauren Collins -- 80. Fundamentals of cryptography / Scott R. Ellis -- Part XIII. Critical infrastructure security -- 81. Securing the infrastructure / Lauren Collins -- 82. Homeland security (online chapter) / Rahul Bhaskar, Bhushan Kapoor -- 83. Cyber warfare / Anna Granova, Marco Slaviero -- 84. Cyber-attack process / Nailah Mims -- Part XIV. Advanced security -- 85. Security through diversity / Kevin Noble -- 86. e-Reputation management and online reputation management survey / Jean-Marc Seigneur -- 87. Content filtering (online chapter) / Pete F. Nicoletti -- 88. Data loss protection / Ken Perkins -- 89. Satellite cyber attack search and destroy / Jeffrey Bardin -- 90. Verifiable voting systems (online chapter) / Thea Peacock, Peter Y.A. Ryan, Steve Schneider, Zhe Xia -- 91. Advanced data encryption / Pramod Pandya. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | This comprehensive reference on computer security offers deep coverage of a wide range of issues in computer and cyber security theory, applications, and best practices.-- |
Assigning source | Adapted from publisher's description. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks |
General subdivision | Security measures. |
Authority record control number or standard number | http://id.loc.gov/authorities/subjects/sh94001277 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data protection. |
Authority record control number or standard number | http://id.loc.gov/authorities/subjects/sh85035859 |
655 #3 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Internet resource. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Vacca, John R., |
Relator term | editor. |
Authority record control number or standard number | http://id.loc.gov/authorities/names/n91039772 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | ebook version : |
International Standard Book Number | 9780128039298 |
856 41 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | Online chapters |
Uniform Resource Identifier | <a href="https://www.elsevier.com/books-and-journals/book-companion/9780128038437">https://www.elsevier.com/books-and-journals/book-companion/9780128038437</a> |
Link text | Click here to access online chapters. |
Public note | Link valid as of 2017-09-20. |
930 ## - EQUIVALENCE OR CROSS-REFERENCE-UNIFORM TITLE HEADING [LOCAL, CANADA] | |
Uniform title | 20180402 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | Books |
Suppress in OPAC | No |
946 ## - LOCAL PROCESSING INFORMATION (OCLC) | |
a | Other US |
No items available.