Computer and information security handbook (Record no. 41422)

MARC details
000 -LEADER
fixed length control field 02019nam a22002057a 4500
003 - CONTROL NUMBER IDENTIFIER
control field PILC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20201013142817.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 201013b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 978-0128038437
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number Elb 005.823
Item number C73c 2017
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name edited by John R. Vacca
245 ## - TITLE STATEMENT
Title Computer and information security handbook
250 ## - EDITION STATEMENT
Edition statement 3rd
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. United States
Name of publisher, distributor, etc. Morgan Kaufmann
Date of publication, distribution, etc. 2017
300 ## - PHYSICAL DESCRIPTION
Extent 1724p.
Other physical details PDF, 30.76 MB
520 ## - SUMMARY, ETC.
Summary, etc. Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements.<br/><br/>With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries.<br/><br/>Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks--Security measures 2. Penetration testing (Computer security)
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://b-ok.asia/book/3401643/e59805">https://b-ok.asia/book/3401643/e59805</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type E-Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Non-fiction Higher Education Department Library Higher Education Department Library Digital Collection 10/13/2020 Free Access(https://b-ok.asia/book/3401643/e59805)   Elb 005.823 C73c 2017 Elb 278 10/13/2020 10/13/2020 E-Books
Santa Isabel College - Manila Library | 210 Taft Avenue, Ermita, Manila, Philippines 1000
Tel. (02) 525-9416 to 19 loc.149 / 127 | E-mail siclibrary@gmail.com