Computer and information security handbook / (Record no. 530)

MARC details
000 -LEADER
fixed length control field 08713nam a22004457a 4500
003 - CONTROL NUMBER IDENTIFIER
control field GSU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240919170508.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 170724t20172017maua b 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2016952601
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBB785642
Source bnb
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number CAT31381658
Source DNAL
035 ## - SYSTEM CONTROL NUMBER
System control number 1381658
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)966205097
Canceled/invalid control number (OCoLC)1124784702
040 ## - CATALOGING SOURCE
Original cataloging agency LCC
Language of cataloging eng
Description conventions rda
Transcribing agency GSU
Modifying agency HEBIS
-- OCLCO
-- MNY
-- WAU
-- OCLCF
-- OCLCA
-- DLC
-- AGL
-- OCLCA
-- UKMGB
-- THHCU
-- OCLCA
-- PHCSB
-- PGC
-- GSU
049 ## - LOCAL HOLDINGS (OCLC)
Holding library AGLL
050 10 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number C627 2017
070 0# - NATIONAL AGRICULTURAL LIBRARY CALL NUMBER
Classification number QA76.9.A25
Item number C627 2017
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Vacca, John R.,
Relator term editor
245 00 - TITLE STATEMENT
Title Computer and information security handbook /
Statement of responsibility, etc. edited by John R. Vacca.
250 ## - EDITION STATEMENT
Edition statement Third edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Cambridge, MA :
Name of producer, publisher, distributor, manufacturer Morgan Kaufmann Publishers, an imprint of Elsevier,
Date of production, publication, distribution, manufacture, or copyright notice [2017]
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice �2017
300 ## - PHYSICAL DESCRIPTION
Extent xli, 1237 pages :
Other physical details illustrations ;
Dimensions 28 cm
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Part I. Overview of system and network security: a comprehensive introduction -- 1. Information security in the modern world / James Pooley -- 2. Building a secure organization / John R. Mallery -- 3. A cryptography primer / Scott R. Ellis -- 4. Verifying user and host identity / Keith Lewis -- 5. Detecting system intrusions / Scott R. Ellis -- 6. Intrusion detection in contemporary environments / Tarfa Hamed, Rozita Dara, Stefan C. Kremer -- 7. Preventing systems intrusions / Michael A. West -- 8. Guarding against network intrusions / Thomas M. Chen -- 9. Fault tolerance and resilience in cloud computing environments / Ravi Jhawar, Vincenzo Piuri -- 10. Securing web applications, services, and servers / Gerald Beuchelt -- 11. UNIX and Linux security / Gerald Beuchelt -- 12. Eliminating security weakness of Linux and UNIX operating systems / Mario Santana -- 13. Internet security / Jesse Walker -- 14. The botnet problem / Nailah Mims -- 15. Intranet security / Bill Mansoor -- 16. Local area network security (online chapter) / Pramod Pandya -- 17. Wireless network security / Chunming Rong, Gansen Zhao, Liang Yan, Erdal Cayirci, Hongbing Cheng -- 18. Wireless sensor network security: the internet of things / Harsh Kupwade Patil, Thomas M. Chen -- 19. Security for the internet of things / William Stallings -- 20. Cellular network security / Peng Liu, Thomas F. LaPorta, Kameswari Kotapati -- 21. Radio frequency identification security / Chunming Rong, Gansen Zhao, Liang Yan, Erdal Cayirci, Hongbing Cheng -- 22. Optical network security (online chapter) / Lauren Collins -- 23. Optical wireless security (online chapter) / Scott R. Ellis -- Part II. Managing information security -- 24. Information security essentials for information technology managers: protecting mission-critical systems / Albert Caballero -- 25. Security management systems / Jim Harmening -- 26. Policy-driven system management / Henrik Plate, Cataldo Basile, Stefano Paraboschi -- 27. Information technology security management (online chapter) / Rahul Bhaskar, Bhushan Kapoor -- 28. The enemy (the intruder's genesis) (online chapter) / Pramod Pandya -- 29. Social engineering deceptions and defenses / Scott R. Ellis -- 30. Ethical hacking / Scott R. Ellis -- 31. What is vulnerability assessment? / Almantas Kakareka -- 32. Security metrics: an introduction and literature review (online chapter) / George O.M. Yee -- 33. Security education, training, and awareness / Albert Caballero -- 34. Risk management / Sokratis K. Katsikas -- 35. Insider threat / William F. Gross -- Part III. Disaster recovery security -- 36. Disaster recovery / Scott R. Ellis, Lauren Collins -- 37. Disaster recovery plans for small and medium businesses (SMBs) / William F. Gross, Jr. -- Part IV. Security standards and policies -- 38. Security certification and standards implementation / Keith Lewis -- 39. Security policies and plans development / Keith Lewis -- Part V. Cyber, network, and systems forensics security and assurance -- 40. Cyber forensics / Scott R. Ellis -- 41. Cyber forensics and incidence response / Cem Gurkok -- 42. Securing e-discovery / Scott R. Ellis -- 43. Network forensics (online chapter) / Yong Guan -- 44. Microsoft Office and metadata forensics: a deeper dive / Rich Hoffman -- 45. Hard drive imaging / John Benjamin Khan -- Part VI. Encryption technology -- 46. Data encryption (online chapter) / Bhushan Kapoor, Pramod Pandya -- 47. Satellite encryption / Daniel S. Soper -- 48. Public key infrastructure / Terence Spies -- 49. Password-based authenticated key establishment protocols (online chapter) / Jean Lancrenon, Dalia Khader, Peter Y.A. Ryan, Feng Hao -- 50. Context-aware multifactor authentication survey / Emin Huseynov, Jean-Marc Seigneur -- 51. Instant-messaging security / Samuel J.J. Curry -- Part VII. Privacy and access management -- 52. Online privacy / Chiara Braghin, Marco Cremonini -- 53. Privacy-enhancing technologies / Simone Fischer-Hbner, Stevan Berthold -- 54. Personal privacy policies (online chapter) / George O.M. Yee, Larry Korba -- 55. Detection of conflicts in security policies / Cataldo Basile, Matteo Maria Casalino, Simone Mutti, Stefano Paraboschi -- 56. Supporting user privacy preferences in digital interactions / Sara Foresti, Pierangela Samarati -- 57. Privacy and security environmental monitoring systems: issues and solutions / Sabrina De Capitani di Vimercati, Angelo Genovese, Giovanni Livraga, Vincenzo Piuri, Fabio Scotti -- 58. Virtual private networks / James T. Harmening -- 59. Identity theft (online chapter) / Markus Jakobsson, Alex Tsow -- Part VIII. Storage security -- 61. SAN security (online chapter) / John McGowan, Jeffrey S. Bardin, John McDonald -- 62. Storage area networking security devices / Robert Rounsavall -- Part IX. Cloud security -- 63. Securing cloud computing systems / Cem Gurkok -- 64. Cloud security / Edward G. Amoroso -- 65. Private cloud security / Keith Lewis -- 66. Virtual private cloud security / Keith Lewis -- Part X. Virtual security -- 67. Protecting virtual infrastructure / Edward G. Amoroso -- 68. Software-defined networking and network function virtualization security / Edward G. Amoroso -- Part XI. Cyber physical security -- 69. Physical security essentials / William Stallings -- 70. Biometrics (online chapter) / Luther Martin -- Part XII. Practical security -- 71. Online identity and user management services / Tewfiq El Maliki, Jean-Marc Seigneur -- 72. Intrusion prevention and detection systems / Christopher Day -- 73. Transmission control protocol/internet protocol packet analysis (online chapter) / Pramod Pandya -- 74. Firewalls (online chapter) / Errin W. Fulp -- 75. Penetration testing / Roman Zabicki, Scott R. Ellis -- 76. System security (online chapter) / Lauren Collins -- 77. Access controls / Lauren Collins -- 78. Endpoint security / Keith Lewis -- 79. Assessments and audits (online chapter) / Lauren Collins -- 80. Fundamentals of cryptography / Scott R. Ellis -- Part XIII. Critical infrastructure security -- 81. Securing the infrastructure / Lauren Collins -- 82. Homeland security (online chapter) / Rahul Bhaskar, Bhushan Kapoor -- 83. Cyber warfare / Anna Granova, Marco Slaviero -- 84. Cyber-attack process / Nailah Mims -- Part XIV. Advanced security -- 85. Security through diversity / Kevin Noble -- 86. e-Reputation management and online reputation management survey / Jean-Marc Seigneur -- 87. Content filtering (online chapter) / Pete F. Nicoletti -- 88. Data loss protection / Ken Perkins -- 89. Satellite cyber attack search and destroy / Jeffrey Bardin -- 90. Verifiable voting systems (online chapter) / Thea Peacock, Peter Y.A. Ryan, Steve Schneider, Zhe Xia -- 91. Advanced data encryption / Pramod Pandya.
520 ## - SUMMARY, ETC.
Summary, etc. This comprehensive reference on computer security offers deep coverage of a wide range of issues in computer and cyber security theory, applications, and best practices.--
Assigning source Adapted from publisher's description.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
Authority record control number or standard number http://id.loc.gov/authorities/subjects/sh94001277
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection.
Authority record control number or standard number http://id.loc.gov/authorities/subjects/sh85035859
655 #3 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Internet resource.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Vacca, John R.,
Relator term editor.
Authority record control number or standard number http://id.loc.gov/authorities/names/n91039772
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information ebook version :
International Standard Book Number 9780128039298
856 41 - ELECTRONIC LOCATION AND ACCESS
Materials specified Online chapters
Uniform Resource Identifier <a href="https://www.elsevier.com/books-and-journals/book-companion/9780128038437">https://www.elsevier.com/books-and-journals/book-companion/9780128038437</a>
Link text Click here to access online chapters.
Public note Link valid as of 2017-09-20.
930 ## - EQUIVALENCE OR CROSS-REFERENCE-UNIFORM TITLE HEADING [LOCAL, CANADA]
Uniform title 20180402
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Suppress in OPAC No
946 ## - LOCAL PROCESSING INFORMATION (OCLC)
a Other US

No items available.