MARC details
000 -LEADER |
fixed length control field |
04755cam a2200313Ia 4500 |
001 - CONTROL NUMBER |
control field |
a4052 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
SIRSI |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
090123s2009 ne a b 001 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2009499916 |
019 ## - |
-- |
311787743 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0123743540 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780123743541 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780080921945 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0080921949 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(Sirsi) i9780123743541 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
Item number |
C66 2009 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition information |
22 |
245 00 - TITLE STATEMENT |
Title |
Computer and information security handbook / |
Statement of responsibility, etc. |
edited by John R. Vacca. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Amsterdam ; |
-- |
Boston : |
Name of publisher, distributor, etc. |
Elsevier ; |
Place of publication, distribution, etc. |
Burlington, Mass. : |
Name of publisher, distributor, etc. |
Morgan Kaufmann, |
Date of publication, distribution, etc. |
c2009. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxxii, 844 p. : |
Other physical details |
ill. ; |
Dimensions |
29 cm. |
490 1# - SERIES STATEMENT |
Series statement |
The Morgan Kaufmann series in computer security. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
505 00 - FORMATTED CONTENTS NOTE |
Title |
Overview of system and network security : a comprehensive introduction / |
Statement of responsibility |
John Mallery -- |
Title |
A cryptography primer / |
Statement of responsibility |
Scott R. Ellis -- |
Title |
Preventing system intrusions / |
Statement of responsibility |
Michael West -- |
Title |
Guarding against network intrusions / |
Statement of responsibility |
Tom Chen and Patrick J. Walsh -- |
Title |
Unix and Linux security / |
Statement of responsibility |
Gerald Beuchelt -- |
Title |
Eliminating the security weakness of Linux and Unix operating systems / |
Statement of responsibility |
Mario Santana -- |
Title |
Internet security / |
Statement of responsibility |
Jesse Walker -- |
Title |
The botnet problem / |
Statement of responsibility |
Xinyuan Wang and Daniel Ramsbrock -- |
Title |
Intranet security / |
Statement of responsibility |
Bill Mansoor -- |
Title |
Local area network security / |
Statement of responsibility |
Pramod Pandya -- |
Title |
Wireless network security / |
Statement of responsibility |
Chunming Rong and Erdal Cayirci -- |
Title |
Cellular network security / |
Statement of responsibility |
Peng Liu, Thomas F. LaPorta and Kameswari Kotapati -- |
Title |
RFID security / |
Statement of responsibility |
Chunming Rong and Erdal Cayirci -- |
Title |
Information security essentials for IT managers, protecting mission-critical systems / |
Statement of responsibility |
Albert Caballero -- |
Title |
Security management systems / |
Statement of responsibility |
Joe Wright and Jim Harmening -- |
Title |
Information technology security management / |
Statement of responsibility |
Rahul Bhasker and Bhushan Kapoor -- |
Title |
Identity management / |
Statement of responsibility |
Jean-Marc Seigneur and Tewfiq El Malika -- |
Title |
Intrusion prevention and detection systems / |
Statement of responsibility |
Christopher Day -- |
Title |
Computer forensics / |
Statement of responsibility |
Scott R. Ellis -- |
Title |
Network forensics / |
Statement of responsibility |
Yong Guan -- |
Title |
Firewalls / |
Statement of responsibility |
Errin W. Fulp -- |
Title |
Penetration testing / |
Statement of responsibility |
Sanjay Bavisi -- |
Title |
What is vulnerability assessment? / |
Statement of responsibility |
Almantas Kakareka -- |
Title |
Data encryption / |
Statement of responsibility |
Bhushan Kapoor and Pramod Pandya -- |
Title |
Satellite encryption / |
Statement of responsibility |
Daniel S. Soper -- |
Title |
Public key infrastructure / |
Statement of responsibility |
Terence Spies -- |
Title |
Instant-messaging security / |
Statement of responsibility |
Samuel J.J. Curry -- |
Title |
NET privacy / |
Statement of responsibility |
Marco Cremonini, Chiara Braghin and Claudio Agostino Ardagna -- |
Title |
Personal privacy policies / |
Statement of responsibility |
George Yee and Larry Korba -- |
Title |
Virtual private networks / |
Statement of responsibility |
Jim Harmening and Joe Wright -- |
Title |
Identity theft / |
Statement of responsibility |
Markus Jacobsson and Alex Tsow -- |
Title |
VoIP security / |
Statement of responsibility |
Dan Wing and Harsh Kupwade Patil -- |
Title |
SAN security / |
Statement of responsibility |
John McGowan, Jeffrey Bardin and John McDonald -- |
Title |
Storage area networking devices security / |
Statement of responsibility |
Robert Rounsavall -- |
Title |
Risk management / |
Statement of responsibility |
Sokratis K. Katsikas -- |
Title |
Physical security essentials / |
Statement of responsibility |
William Stallings -- |
Title |
Biometrics / |
Statement of responsibility |
Luther Martin -- |
Title |
Homeland security / |
Statement of responsibility |
Rahul Bhaskar and Bhushan Kapoor -- |
Title |
Information warfare / |
Statement of responsibility |
Jan Eloff and Anna Granova -- |
Title |
Security through diversity / |
Statement of responsibility |
Kevin Noble -- |
Title |
Reputation management / |
Statement of responsibility |
Jean-Marc Seigneur -- |
Title |
Content filtering / |
Statement of responsibility |
Peter Nicoletti -- |
Title |
Data loss protection / |
Statement of responsibility |
Ken Perkins -- |
Miscellaneous information |
Appendix A: |
Title |
Configuring authentication service on Microsoft Windows Vista / |
Statement of responsibility |
John R. Vacca -- |
Miscellaneous information |
Appendix B: |
Title |
Security management and resiliency / |
Statement of responsibility |
John R. Vacca -- |
Miscellaneous information |
Appendix C: |
Title |
List of top security implementation and deployment companies -- |
Miscellaneous information |
Appendix D: |
Title |
List of security products -- |
Miscellaneous information |
Appendix E: |
Title |
List of security standards -- |
Miscellaneous information |
Appendix F: |
Title |
List of miscellaneous security resources -- |
Miscellaneous information |
Appendix G: |
Title |
Ensuring built-in frequency hopping spread spectrum wireless network security -- |
Miscellaneous information |
Appendix H: |
Title |
Configuring wireless internet security remote access -- |
Miscellaneous information |
Appendix I: |
Title |
Frequently asked questions -- |
Miscellaneous information |
Appendix J: Glossary. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book also covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems. --from publisher description. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures. |
655 #7 - INDEX TERM--GENRE/FORM |
Genre/form data or focus term |
Aufsatzsammlung. |
Source of term |
swd. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Vacca, John R. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Morgan Kaufmann series in computer security. |