MARC details
000 -LEADER |
fixed length control field |
02019nam a22002057a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
PILC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20201013142817.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
201013b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
978-0128038437 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
Elb 005.823 |
Item number |
C73c 2017 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
edited by John R. Vacca |
245 ## - TITLE STATEMENT |
Title |
Computer and information security handbook |
250 ## - EDITION STATEMENT |
Edition statement |
3rd |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc. |
United States |
Name of publisher, distributor, etc. |
Morgan Kaufmann |
Date of publication, distribution, etc. |
2017 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1724p. |
Other physical details |
PDF, 30.76 MB |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements.<br/><br/>With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries.<br/><br/>Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks--Security measures 2. Penetration testing (Computer security) |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://b-ok.asia/book/3401643/e59805">https://b-ok.asia/book/3401643/e59805</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
E-Books |