000 -LEADER | |
---|---|
fixed length control field | 04897cam a2200409 i 4500 |
001 - CONTROL NUMBER | |
control field | 39658 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | AE-DuAU |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20241127174530.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 130529s2013 ne a b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
LC control number | 2013020996 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780123943972 : |
Terms of availability | 129.95 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0123943973 : |
Terms of availability | 129.95 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | DLC |
Language of cataloging | eng |
Transcribing agency | DLC |
Description conventions | rda |
Modifying agency | DLC |
042 ## - AUTHENTICATION CODE | |
Authentication code | pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
Item number | C627 2013 |
069 ## - | |
-- | 09758044 |
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (OCLC) | |
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) | REF QA 76.9 .A25 C627 2013 |
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (OCLC) | |
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) | REF QA 76.9 .A25 C627 2013 |
245 00 - TITLE STATEMENT | |
Title | Computer and information security handbook / |
Statement of responsibility, etc | edited by John R. Vacca. |
250 ## - EDITION STATEMENT | |
Edition statement | Second edition. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | Amsterdam : |
Name of publisher, distributor, etc | Elsevier, Morgan Kaufmann, |
Date of publication, distribution, etc | [2013]. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxviii, 1171 pages : |
Other physical details | illustrations ; |
Dimensions | 29 cm |
336 ## - CONTENT TYPE | |
Source | rdacontent |
Content Type Term | text |
Content Type Code | txt |
337 ## - MEDIA TYPE | |
Source | rdamedia |
Media Type Term | unmediated |
Media Type Code | n |
338 ## - CARRIER TYPE | |
Source | rdacarrier |
Carrier Type Term | volume |
Carrier Type Code | nc |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Part I Overview of System and Network Security: A Comprehensive Introduction -- Chapter 1 Building a Secure Organization -- Chapter 2 A Cryptography Primer -- Chapter 3 Detecting System Intrusions -- Chapter 4 Preventing System Intrusions -- Chapter 5 Guarding against network intrusion -- Chapter 6 Securing Cloud Computing Systems -- Chapter 7 Fault Tolerance and Resilience in Cloud Computing Environments -- Chapter 8 Securing Web Applications, Services and Servers -- Chapter 9 Unix and Linux Security -- Chapter 10 Eliminating the Security Weakness of Linux and UNIX Operating Systems -- Chapter 11 Internet Security -- Chapter 12 The Botnet Problem -- Chapter 13 Intranet Security -- Chapter 14 Local Area Network Security -- Chapter 15 Wireless Network Security -- Chapter 16 Wireless Sensor Network Security -- Chapter 17 Cellular Network Security -- Chapter 18 RFID Security -- Chapter 19 Optical Network Security -- Chapter 20 -- Optical Wireless Security -- Part II Managing Information Security -- Chapter 21 Information Security Essentials for IT Managers: Protecting Mission-Critical Systems -- Chapter 22 Security Management Systems -- Chapter 23 Policy-driven System Management -- Chapter 24 Information Technology Security Management -- Chapter 25 Online Identity and User Management Services-- Chapter 26 Intrusion Prevention and Detection Systems-- Chapter 27 TCP/IP Packet Analysis -- Chapter 28 The Enemy (The Intruder’s Genesis) --Chapter 29 Firewalls -- Chapter 30 Penetration Testing -- Chapter 31 What Is Vulnerability Assessment? -- Chapter 32 Security Metrics: An Introduction and Literature Review-- Part III Cyber, Network, and Systems Forensics Security and Assurance -- Chapter 33 Cyber Forensics-- Chapter 34 Cyber Forensics and Incident Response -- Chapter 35 Securing e-Discovery -- Chapter 36 Network Forensics -- Part IV Encryption Technology -- Chapter 37 Data Encryption -- Chapter 38 Satellite Encryption -- Chapter 39 Public Key Infrastructure(Online Chapter) -- Chapter 40 Password-based Authenticated Key Establishment Protocols -- Chapter 41 Instant-Messaging Security -- Part V Privacy and Access Management -- Chapter 42 Privacy on the Internet -- Chapter 43 Privacy-Enhancing Technologies -- Chapter 44 Personal Privacy Policies -- Chapter 45 Detection Of Conflicts In Security Policies -- Chapter 46 Supporting User Privacy Preferences in Digital Interactions -- Chapter 47 Privacy and Security in Environmental Monitoring Systems: Issues and Solutions -- Chapter 48 Virtual Private Networks -- Chapter 49 Identity Theft --Chapter 50 VoIP Security -- Part VI Storage Security -- Chapter 51 SAN Security(Online Chapter) -- Chapter 52 Storage Area Networking Security Devices -- Chapter 53 Risk Management -- Part VII Physical Security -- Chapter 54 Physical Security Essentials -- Chapter 55 Disaster Recovery -- Chapter 56 Biometrics -- Chapter 57 Homeland Security(Online Chapter) -- Chapter 58 Cyber Warfare {u2013}Part VIII Practical Security -- Chapter 59 System Security -- Chapter 60 Securing the Infrastructure -- Chapter 61 Access Controls -- Chapter 62 Assessments and Audits {u2013}Chapter 63 Fundamentals of Cryptography -- Part IX Advanced Security --Chapter 64 Security Through Diversity -- Chapter 65 Online e-Reputation Management Services -- Chapter 66 Content Filtering -- Chapter 67 Data Loss Protection -- Chapter 68 Satellite Cyber Attack Search and Destroy -- Chapter 69 Verifiable Voting Systems -- Chapter 70 Advanced Data Encryption. |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes bibliographical references and index. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Security measures. |
9 (RLIN) | 174138 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Penetration testing (Computer security) |
9 (RLIN) | 174139 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Vacca, John R. |
9 (RLIN) | 174140 |
852 1# - LOCATION/CALL NUMBER | |
-- | P129.95usd |
907 ## - LOCAL DATA ELEMENT G, LDG (RLIN) | |
a | |
b | 12-12-13 |
c | 12-08-13 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Reference Books |
998 ## - LOCAL CONTROL INFORMATION (RLIN) | |
-- | ref |
Operator's initials, OID (RLIN) | 12-08-13 |
Cataloger's initials, CIN (RLIN) | m |
First Date, FD (RLIN) | a |
-- | n |
-- | eng |
-- | ne |
-- | 0 |
945 ## - LOCAL PROCESSING INFORMATION (OCLC) | |
g | 0 |
i | 5101631 |
j | 0 |
l | ref |
o | - |
p | 478.00 |
q | - |
r | - |
s | - |
t | 2 |
u | 0 |
v | 0 |
w | 0 |
x | 0 |
y | i15632234 |
z | 12-08-13 |
Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Cost, normal purchase price | Total Checkouts | Full call number | Barcode | Date last seen | Cost, replacement price | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Library of Congress Classification | American University in Dubai | American University in Dubai | Reference Books | 2013-12-08 | 478.00 | REF QA 76.9 .A25 C627 2013 | 5101631 | 2019-01-21 | 478.00 | 2015-07-25 | Reference Books |