Library Logo

Computer security handbook / (Record no. 207062)

000 -LEADER
fixed length control field 06983cam a2200889 i 4500
001 - CONTROL NUMBER
control field ocn862041532
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20171106081546.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu---unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 131031s2014 nju ob 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2013043853
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118851791
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 111885179X
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118851746
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1118851749
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118851678
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1118851676
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1118134109
Qualifying information (vol. 1 ;
-- pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118134108
Qualifying information (vol. 1 ;
-- pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1118134117
Qualifying information (vol. 2 ;
-- pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118134115
Qualifying information (vol. 2 ;
-- pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1118127064
Qualifying information (2 volume set ;
-- pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118127063
Qualifying information (2 volume set ;
-- pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781118851722
Qualifying information (pdf)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 1118851722
Qualifying information (pdf)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781118134108
Qualifying information (v. 1 ;
-- pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781118127063
Qualifying information (2 volume set ;
-- pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781118134115
Qualifying information (v. 2 ;
-- pbk.)
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000052901623
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000053310544
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBSZ
System control number 431653348
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBBG
System control number BV043396316
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)862041532
Canceled/invalid control number (OCoLC)874322357
-- (OCoLC)880758875
-- (OCoLC)889313753
037 ## - SOURCE OF ACQUISITION
Stock number 88D4DA59-9CCD-4F5D-8A15-814529620F68
Source of stock number/acquisition OverDrive, Inc.
Note http://www.overdrive.com
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency DLC
Modifying agency YDX
-- N$T
-- OCLCO
-- YDXCP
-- OCLCO
-- CDX
-- B24X7
-- COO
-- OCLCF
-- OCLCQ
-- OCLCO
-- E7B
-- EBLCP
-- TEFOD
-- AU@
-- DEBSZ
-- DG1
-- TEFOD
-- OCLCQ
-- DEBBG
042 ## - AUTHENTICATION CODE
Authentication code pcc
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HF5548.37
Item number .C64 2014
072 #7 - SUBJECT CATEGORY CODE
Subject category code BUS
Subject category code subdivision 082000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code BUS
Subject category code subdivision 041000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code BUS
Subject category code subdivision 042000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code BUS
Subject category code subdivision 085000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 658.4/78
Edition number 23
245 00 - TITLE STATEMENT
Title Computer security handbook /
Statement of responsibility, etc. edited by Seymour Bosworth, Michel E. Kabay, Eric Whyne.
Medium [electronic resource]
250 ## - EDITION STATEMENT
Edition statement Sixth edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Hoboken, New Jersey :
Name of producer, publisher, distributor, manufacturer Wiley,
Date of production, publication, distribution, manufacture, or copyright notice [2014]
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (2 volumes)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note COMPUTER SECURITY HANDBOOK (Volume 1); CONTENTS; PREFACE; ACKNOWLEDGMENTS; ABOUT THE EDITORS; ABOUT THE CONTRIBUTORS; A NOTE TO THE INSTRUCTOR; INTRODUCTION TO PART I: FOUNDATIONS OF COMPUTER SECURITY; CHAPTER 1 BRIEF HISTORY AND MISSION OF INFORMATION SYSTEM SECURITY; 1.1 INTRODUCTION TO INFORMATION SYSTEM SECURITY; 1.2 EVOLUTION OF INFORMATION SYSTEMS; 1.2.1 1950s: Punched-Card Systems; 1.2.2 Large-Scale Computers; 1.2.3 Medium-Size Computers; 1.2.4 1960s: Small-Scale Computers; 1.2.5 Transistors and Core Memory; 1.2.6 Time Sharing; 1.2.7 Real-Time, Online Systems.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 1.2.8 A Family of Computers1.2.9 1970s: Microprocessors; 1.2.10 The First Personal Computers; 1.2.11 The First Network; 1.2.12 Further Security Considerations; 1.2.13 The First "Worm"; 1.2.14 1980s: Productivity Enhancements; 1.2.15 1980s: The Personal Computer; 1.2.16 Local Area Networks; 1.2.17 1990s: Interconnection; 1.2.18 1990s: Total Interconnection; 1.2.19 Telecommuting; 1.2.20 Internet and the World Wide Web; 1.2.21 Virtualization and the Cloud; 1.2.22 Supervisory Control and Data Acquisition; 1.3 GOVERNMENT RECOGNITION OF INFORMATION ASSURANCE; 1.3.1 IA Standards.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 1.3.2 Computers at Risk1.3.3 InfraGard; 1.4 RECENT DEVELOPMENTS; 1.5 ONGOING MISSION FOR INFORMATION SYSTEM SECURITY; 1.6 NOTES; CHAPTER 2 HISTORY OF COMPUTER CRIME; 2.1 WHY STUDY HISTORICAL RECORDS?; 2.2 OVERVIEW; 2.3 1960S AND 1970S: SABOTAGE; 2.3.1 Direct Damage to Computer Centers; 2.3.2 1970-1972: Albert the Saboteur; 2.4 IMPERSONATION; 2.4.1 1970: Jerry Neal Schneider; 2.4.2 1980-2003: Kevin Mitnick; 2.4.3 Credit Card Fraud; 2.4.4 Identity Theft Rises; 2.5 PHONE PHREAKING; 2.5.1 2600 Hz; 2.5.2 1982-1991: Kevin Poulsen; 2.6 DATA DIDDLING; 2.6.1 Equity Funding Fraud (1964-1973).
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2.6.2 1994: Vladimir Levin and the Citibank Heist2.7 SALAMI FRAUD; 2.8 LOGIC BOMBS; 2.9 EXTORTION; 2.10 TROJAN HORSES; 2.10.1 1988 Flu-Shot Hoax; 2.10.2 Scrambler, 12-Tricks, and PC Cyborg; 2.10.3 1994: Datacomp Hardware Trojan; 2.10.4 Keylogger Trojans; 2.10.5 Haephrati Trojan; 2.10.6 Hardware Trojans and Information Warfare; 2.11 NOTORIOUS WORMS AND VIRUSES; 2.11.1 1970-1990: Early Malware Outbreaks; 2.11.2 December 1987: Christmas Tree Worm; 2.11.3 November 2, 1988: Morris Worm; 2.11.4 Malware in the 1990s; 2.11.5 March 1999: Melissa; 2.11.6 May 2000: I Love You; 2.11.7 July 2010 Stuxnet.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2.12 SPAM 22.12.1 1994: Green Card Lottery Spam; 2.12.2 Spam Goes Global; 2.13 DENIAL OF SERVICE; 2.13.1 1996: Unamailer; 2.13.2 2000: MafiaBoy; 2.14 HACKER UNDERGROUND; 2.14.1 1981: Chaos Computer Club; 2.14.2 1982: The 414s; 2.14.3 1984: Cult of the Dead Cow; 2.14.4 1984: 2600: The Hacker Quarterly; 2.14.5 1984: Legion of Doom; 2.14.6 1985: Phrack; 2.14.7 1989: Masters of Deception; 2.14.8 1990: Operation Sundevil; 2.14.9 1990: Steve Jackson Games; 2.14.10 1992: L0pht Heavy Industries; 2.14.11 2004: Shadowcrew; 2.14.12 Late 2000s: Russian Business Network (RBN); 2.14.13 Anonymous.
520 ## - SUMMARY, ETC.
Summary, etc. Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written for professionals and college students, it provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more. This essential and highly-regarded r.
588 0# - SOURCE OF DESCRIPTION NOTE
Source of description note Online resource; title from digital title page (viewed on April 24, 2014).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Electronic data processing departments
General subdivision Security measures.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Electronic data processing departments
General subdivision Security measures.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information technology
General subdivision Security measures.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element BUSINESS & ECONOMICS
General subdivision Industrial Management.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element BUSINESS & ECONOMICS
General subdivision Management.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element BUSINESS & ECONOMICS
General subdivision Management Science.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element BUSINESS & ECONOMICS
General subdivision Organizational Behavior.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Electronic data processing departments
General subdivision Security measures.
Source of heading or term fast
Authority record control number (OCoLC)fst00907090
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Bosworth, Seymour,
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kabay, Michel E.,
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Whyne, Eric,
Dates associated with a name 1981-
Relator term editor.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Title Computer security handbook
International Standard Book Number 9781118127063
Record control number (DLC) 2013041083
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://onlinelibrary.wiley.com/book/10.1002/9781118851678
Public note Wiley Online Library
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Books

No items available.

Last Updated on September 15, 2019
© Dhaka University Library. All Rights Reserved|Staff Login