Normal view MARC view

Computer and information security handbook / (Record no. 39658)

MARC details
000 -LEADER
fixed length control field 04897cam a2200409 i 4500
001 - CONTROL NUMBER
control field 39658
003 - CONTROL NUMBER IDENTIFIER
control field AE-DuAU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20241127174530.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 130529s2013 ne a b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2013020996
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780123943972 :
Terms of availability 129.95
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0123943973 :
Terms of availability 129.95
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Description conventions rda
Modifying agency DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number C627 2013
069 ## -
-- 09758044
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (OCLC)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) REF QA 76.9 .A25 C627 2013
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (OCLC)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) REF QA 76.9 .A25 C627 2013
245 00 - TITLE STATEMENT
Title Computer and information security handbook /
Statement of responsibility, etc edited by John R. Vacca.
250 ## - EDITION STATEMENT
Edition statement Second edition.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Amsterdam :
Name of publisher, distributor, etc Elsevier, Morgan Kaufmann,
Date of publication, distribution, etc [2013].
300 ## - PHYSICAL DESCRIPTION
Extent xxviii, 1171 pages :
Other physical details illustrations ;
Dimensions 29 cm
336 ## - CONTENT TYPE
Source rdacontent
Content Type Term text
Content Type Code txt
337 ## - MEDIA TYPE
Source rdamedia
Media Type Term unmediated
Media Type Code n
338 ## - CARRIER TYPE
Source rdacarrier
Carrier Type Term volume
Carrier Type Code nc
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Part I Overview of System and Network Security: A Comprehensive Introduction -- Chapter 1 Building a Secure Organization -- Chapter 2 A Cryptography Primer -- Chapter 3 Detecting System Intrusions -- Chapter 4 Preventing System Intrusions -- Chapter 5 Guarding against network intrusion -- Chapter 6 Securing Cloud Computing Systems -- Chapter 7 Fault Tolerance and Resilience in Cloud Computing Environments -- Chapter 8 Securing Web Applications, Services and Servers -- Chapter 9 Unix and Linux Security -- Chapter 10 Eliminating the Security Weakness of Linux and UNIX Operating Systems -- Chapter 11 Internet Security -- Chapter 12 The Botnet Problem -- Chapter 13 Intranet Security -- Chapter 14 Local Area Network Security -- Chapter 15 Wireless Network Security -- Chapter 16 Wireless Sensor Network Security -- Chapter 17 Cellular Network Security -- Chapter 18 RFID Security -- Chapter 19 Optical Network Security -- Chapter 20 -- Optical Wireless Security -- Part II Managing Information Security -- Chapter 21 Information Security Essentials for IT Managers: Protecting Mission-Critical Systems -- Chapter 22 Security Management Systems -- Chapter 23 Policy-driven System Management -- Chapter 24 Information Technology Security Management -- Chapter 25 Online Identity and User Management Services-- Chapter 26 Intrusion Prevention and Detection Systems-- Chapter 27 TCP/IP Packet Analysis -- Chapter 28 The Enemy (The Intruder’s Genesis) --Chapter 29 Firewalls -- Chapter 30 Penetration Testing -- Chapter 31 What Is Vulnerability Assessment? -- Chapter 32 Security Metrics: An Introduction and Literature Review-- Part III Cyber, Network, and Systems Forensics Security and Assurance -- Chapter 33 Cyber Forensics-- Chapter 34 Cyber Forensics and Incident Response -- Chapter 35 Securing e-Discovery -- Chapter 36 Network Forensics -- Part IV Encryption Technology -- Chapter 37 Data Encryption -- Chapter 38 Satellite Encryption -- Chapter 39 Public Key Infrastructure(Online Chapter) -- Chapter 40 Password-based Authenticated Key Establishment Protocols -- Chapter 41 Instant-Messaging Security -- Part V Privacy and Access Management -- Chapter 42 Privacy on the Internet -- Chapter 43 Privacy-Enhancing Technologies -- Chapter 44 Personal Privacy Policies -- Chapter 45 Detection Of Conflicts In Security Policies -- Chapter 46 Supporting User Privacy Preferences in Digital Interactions -- Chapter 47 Privacy and Security in Environmental Monitoring Systems: Issues and Solutions -- Chapter 48 Virtual Private Networks -- Chapter 49 Identity Theft --Chapter 50 VoIP Security -- Part VI Storage Security -- Chapter 51 SAN Security(Online Chapter) -- Chapter 52 Storage Area Networking Security Devices -- Chapter 53 Risk Management -- Part VII Physical Security -- Chapter 54 Physical Security Essentials -- Chapter 55 Disaster Recovery -- Chapter 56 Biometrics -- Chapter 57 Homeland Security(Online Chapter) -- Chapter 58 Cyber Warfare {u2013}Part VIII Practical Security -- Chapter 59 System Security -- Chapter 60 Securing the Infrastructure -- Chapter 61 Access Controls -- Chapter 62 Assessments and Audits {u2013}Chapter 63 Fundamentals of Cryptography -- Part IX Advanced Security --Chapter 64 Security Through Diversity -- Chapter 65 Online e-Reputation Management Services -- Chapter 66 Content Filtering -- Chapter 67 Data Loss Protection -- Chapter 68 Satellite Cyber Attack Search and Destroy -- Chapter 69 Verifiable Voting Systems -- Chapter 70 Advanced Data Encryption.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
9 (RLIN) 174138
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Penetration testing (Computer security)
9 (RLIN) 174139
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Vacca, John R.
9 (RLIN) 174140
852 1# - LOCATION/CALL NUMBER
-- P129.95usd
907 ## - LOCAL DATA ELEMENT G, LDG (RLIN)
a
b 12-12-13
c 12-08-13
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Reference Books
998 ## - LOCAL CONTROL INFORMATION (RLIN)
-- ref
Operator's initials, OID (RLIN) 12-08-13
Cataloger's initials, CIN (RLIN) m
First Date, FD (RLIN) a
-- n
-- eng
-- ne
-- 0
945 ## - LOCAL PROCESSING INFORMATION (OCLC)
g 0
i 5101631
j 0
l ref
o -
p 478.00
q -
r -
s -
t 2
u 0
v 0
w 0
x 0
y i15632234
z 12-08-13
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type
  Library of Congress Classification     American University in Dubai American University in Dubai Reference Books 2013-12-08 478.00   REF QA 76.9 .A25 C627 2013 5101631 2019-01-21 478.00 2015-07-25 Reference Books
  • Monday - Friday
  • 8:00 AM - 5:00 PM
  • Saturday - Sunday
  • Closed
  • Phone: +971 431 83183
  • Email: Library@aud.edu
  • Address: Sheikh Zayed Road -- P.O. Box 28282, Dubai, AE
  • Map & Directions