000 -LEADER |
fixed length control field |
04313cam a22003497a 4500 |
001 - CONTROL NUMBER |
control field |
16036441 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
APU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20151118051504.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
091229s2009 ne a b 001 0 eng c |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2009499916 |
015 ## - NATIONAL BIBLIOGRAPHY NUMBER |
National bibliography number |
GBA938836 |
Source |
bnb |
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER |
Record control number |
015116339 |
Source |
Uk |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780123743541 (hbk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0123743540 (hbk.) |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)ocn299240534 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
YDXCP |
Transcribing agency |
YDXCP |
Modifying agency |
NEDA |
-- |
ANA |
Language of cataloging |
eng |
042 ## - AUTHENTICATION CODE |
Authentication code |
lccopycat |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
Item number |
C66 2009 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
22 |
Item number |
COM 2009 |
245 00 - TITLE STATEMENT |
Title |
Computer and information security handbook / |
Statement of responsibility, etc |
edited by John R. Vacca. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Amsterdam ; |
-- |
Boston : |
Name of publisher, distributor, etc |
Elsevier ; |
Place of publication, distribution, etc |
Burlington, MA : |
Name of publisher, distributor, etc |
Morgan Kaufmann, |
Date of publication, distribution, etc |
c2009. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxxii, 844 p. : |
Other physical details |
ill. ; |
Dimensions |
29 cm. |
490 0# - SERIES STATEMENT |
Series statement |
The Morgan Kaufmann series in computer security |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
505 00 - FORMATTED CONTENTS NOTE |
Title |
Overview of system and network security : a comprehensive introduction / |
Statement of responsibility |
John Mallery -- |
Title |
A cryptography primer / |
Statement of responsibility |
Scott R. Ellis -- |
Title |
Preventing system intrusions / |
Statement of responsibility |
Michael West -- |
Title |
Guarding against network intrusions / |
Statement of responsibility |
Tom Chen and Patrick J. Walsh -- |
Title |
Unix and Linux security / |
Statement of responsibility |
Gerald Beuchelt -- |
Title |
Eliminating the security weakness of Linux and Unix operating systems / |
Statement of responsibility |
Mario Santana -- |
Title |
Internet security / |
Statement of responsibility |
Jesse Walker -- |
Title |
The botnet problem / |
Statement of responsibility |
Xinyuan Wang and Daniel ramsbrock -- |
Title |
Intranet security / |
Statement of responsibility |
Bill Mansoor -- |
Title |
Local area network security / |
Statement of responsibility |
Pramod Pandya -- |
Title |
Wireless network security / |
Statement of responsibility |
Chunming Rong and Erdal Cayirci -- |
Title |
Cellular network security / |
Statement of responsibility |
Peng Liu, Thomas F. LaPorta and Kameswari Kotapati -- |
Title |
RFID security / |
Statement of responsibility |
Chunming Rong and Erdal Cayirci -- |
Title |
Information security essentials for IT managers, protecting mission-critical systems / |
Statement of responsibility |
Albert Caballero -- |
Title |
Security management systems / |
Statement of responsibility |
Joe Wright and Jim Harmening -- |
Title |
Information technology security management / |
Statement of responsibility |
Rahul Bhasker and Bhushan Kapoor -- |
Title |
Identity management / |
Statement of responsibility |
Jean-Marc Seigneur and Tewfiq El Malika -- |
Title |
Intrusion prevention and detection systems / |
Statement of responsibility |
Christopher Day -- |
Title |
Computer forensics / |
Statement of responsibility |
Scott R. Ellis -- |
Title |
Network forensics / |
Statement of responsibility |
Yong Guan -- |
Title |
Firewalls / |
Statement of responsibility |
Errin W. Fulp -- |
Title |
Penetration testing / |
Statement of responsibility |
Sanjay Bavisi -- |
Title |
What is vulnerability assessment? / |
Statement of responsibility |
Almantas Kakareka -- |
Title |
Data encryption / |
Statement of responsibility |
Bhushan Kapoor and Pramod Pandya -- |
Title |
Satellite encryption / |
Statement of responsibility |
Daniel S. Soper -- |
Title |
Public key infrastructure / |
Statement of responsibility |
Terence Spies -- |
Title |
Instant-messaging security / |
Statement of responsibility |
Samuel J.J. Curry -- |
Title |
NET privacy / |
Statement of responsibility |
Marco Cremonini, Chiara Braghin and Claudio Agostino Ardagna -- |
Title |
Personal privacy policies / |
Statement of responsibility |
George Yee and Larry Korba -- |
Title |
Virtual private networks / |
Statement of responsibility |
Jim Harmening and Joe Wright -- |
Title |
Identity theft / |
Statement of responsibility |
Markus Jacobsson and Alex Tsow -- |
Title |
VoIP security / |
Statement of responsibility |
Dan Wing and Harsh Kupwade Patil -- |
Title |
SAN security / |
Statement of responsibility |
John McGowan, Jeffrey Bardin and John McDonald -- |
Title |
Storage area networking devices security / |
Statement of responsibility |
Robert Rounsavall -- |
Title |
Risk management / |
Statement of responsibility |
Sokratis K. Katsikas -- |
Title |
Physical security essentials / |
Statement of responsibility |
William Stallings -- |
Title |
Biometrics / |
Statement of responsibility |
Luther Martin -- |
Title |
Homeland security / |
Statement of responsibility |
Rahul Bhaskar and Bhushan Kapoor -- |
Title |
Information warfare / |
Statement of responsibility |
Jan Eloff and Anna Granova -- |
Title |
Security through diversity / |
Statement of responsibility |
Kevin Noble -- |
Title |
Reputation management / |
Statement of responsibility |
Jean-Marc Seigneur -- |
Title |
Content filtering / |
Statement of responsibility |
Peter Nicoletti -- |
Title |
Data loss protection / |
Statement of responsibility |
Ken Perkins -- |
Miscellaneous information |
Appendix A: |
Title |
Configuring authentication service on Microsoft Windows Vista / |
Statement of responsibility |
John R. Vacca -- |
Miscellaneous information |
Appendix B: |
Title |
Security management and resiliency / |
Statement of responsibility |
John R. Vacca -- |
Miscellaneous information |
Appendix C: |
Title |
List of top security implementation and deployment companies -- |
Miscellaneous information |
Appendix D: |
Title |
List of security products -- |
Miscellaneous information |
Appendix E: |
Title |
List of security standards -- |
Miscellaneous information |
Appendix F: |
Title |
List of miscellaneous security resources -- |
Miscellaneous information |
Appendix G: |
Title |
Ensuring built-in frequency hopping spread spectrum wireless network security -- |
Miscellaneous information |
Appendix H: |
Title |
Configuring wireless internet security remote access -- |
Miscellaneous information |
Appendix I: |
Title |
Frequently asked questions -- |
Miscellaneous information |
Appendix J: Glossary. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures. |
9 (RLIN) |
77 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Penetration testing (Computer security) |
9 (RLIN) |
11344 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Vacca, John R. |
9 (RLIN) |
13545 |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
copycat |
d |
2 |
e |
ncip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
Book |
Koha issues (borrowed), all copies |
6 |