Computer and information security handbook (Record no. 112)

000 -LEADER
fixed length control field 07721cam a2200625Ia 4500
001 - CONTROL NUMBER
control field ocn429898404
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140426153706.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu---unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 090810s2009 ne a ob 001 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency OPELS
Language of cataloging eng
Transcribing agency OPELS
Modifying agency OPELS
-- N$T
-- OCLCQ
-- IDEBK
-- OCLCQ
-- OPELS
-- OCLCQ
-- B24X7
-- OSU
-- EBLCP
-- COO
-- CNCGM
-- E7B
-- DKDLA
-- ALAUL
-- OCLCQ
-- DEBSZ
-- ZAD
019 ## -
-- 458273793
-- 605705457
-- 647821738
-- 769362626
-- 771282247
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780080921945 (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0080921949 (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9780123743541
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0123743540
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780123743541
024 8# - OTHER STANDARD IDENTIFIER
Standard number or code 9786612168703
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000046894970
029 1# - (OCLC)
OCLC library identifier DEBBG
System control number BV039828815
029 1# - (OCLC)
OCLC library identifier DEBSZ
System control number 372887295
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)429898404
Canceled/invalid control number (OCoLC)458273793
-- (OCoLC)605705457
-- (OCoLC)647821738
-- (OCoLC)769362626
-- (OCoLC)771282247
037 ## - SOURCE OF ACQUISITION
Stock number 216870
Source of stock number/acquisition MIL
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number .C66 2009eb
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 060040
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 043050
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 053000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
049 ## - LOCAL HOLDINGS (OCLC)
Holding library NTRA
245 00 - TITLE STATEMENT
Title Computer and information security handbook
Medium [electronic resource] /
Statement of responsibility, etc edited by John R. Vacca.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Amsterdam ;
-- Boston :
Name of publisher, distributor, etc Elsevier ;
Place of publication, distribution, etc Burlington, MA :
Name of publisher, distributor, etc Morgan Kaufmann,
Date of publication, distribution, etc c2009.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (xxxii, 844 p.) :
Other physical details ill.
490 1# - SERIES STATEMENT
Series statement The Morgan Kaufmann series in computer security
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 00 - FORMATTED CONTENTS NOTE
Title Building a secure organization /
Statement of responsibility John Mallery --
Title A cryptography primer /
Statement of responsibility Scott R. Ellis --
Title Preventing system intrusions /
Statement of responsibility Michael West --
Title Guarding against network intrusions /
Statement of responsibility Tom Chen and Patrick J. Walsh --
Title Unix and Linux security /
Statement of responsibility Gerald Beuchelt --
Title Eliminating the security weakness of Linux and Unix operating systems /
Statement of responsibility Mario Santana --
Title Internet security /
Statement of responsibility Jesse Walker --
Title The botnet problem /
Statement of responsibility Xinyuan Wang and Daniel ramsbrock --
Title Intranet security /
Statement of responsibility Bill Mansoor --
Title Local area network security /
Statement of responsibility Pramod Pandya --
Title Wireless network security /
Statement of responsibility Chunming Rong and Erdal Cayirci --
Title Cellular network security /
Statement of responsibility Peng Liu, Thomas F. LaPorta and Kameswari Kotapati --
Title RFID security /
Statement of responsibility Chunming Rong and Erdal Cayirci --
Title Information security essentials for IT managers, protecting mission-critical systems /
Statement of responsibility Albert Caballero --
Title Security management systems /
Statement of responsibility Joe Wright and Jim Harmening --
Title Information technology security management /
Statement of responsibility Rahul Bhasker and Bhushan Kapoor --
Title Identity management /
Statement of responsibility Jean-Marc Seigneur and Tewfiq El Malika --
Title Intrusion prevention and detection systems /
Statement of responsibility Christopher Day --
Title Computer forensics /
Statement of responsibility Scott R. Ellis --
Title Network forensics /
Statement of responsibility Yong Guan --
Title Firewalls /
Statement of responsibility Errin W. Fulp --
Title Penetration testing /
Statement of responsibility Sanjay Bavisi --
Title What is vulnerability assessment? /
Statement of responsibility Almantas Kakareka --
Title Data encryption /
Statement of responsibility Bhushan Kapoor and Pramod Pandya --
Title Satellite encryption /
Statement of responsibility Daniel S. Soper --
Title Public key infrastructure /
Statement of responsibility Terence Spies --
Title Instant-messaging security /
Statement of responsibility Samuel J.J. Curry --
Title NET privacy /
Statement of responsibility Marco Cremonini, Chiara Braghin and Claudio Agostino Ardagna --
Title Personal privacy policies /
Statement of responsibility George Yee and Larry Korba --
Title Virtual private networks /
Statement of responsibility Jim Harmening and Joe Wright --
Title Identity theft /
Statement of responsibility Markus Jacobsson and Alex Tsow --
Title VoIP security /
Statement of responsibility Dan Wing and Harsh Kupwade Patil --
Title SAN security /
Statement of responsibility John McGowan, Jeffrey Bardin and John McDonald --
Title Storage area networking devices security /
Statement of responsibility Robert Rounsavall --
Title Risk management /
Statement of responsibility Sokratis K. Katsikas --
Title Physical security essentials /
Statement of responsibility William Stallings --
Title Biometrics /
Statement of responsibility Luther Martin --
Title Homeland security /
Statement of responsibility Rahul Bhaskar and Bhushan Kapoor --
Title Information warfare /
Statement of responsibility Jan Eloff and Anna Granova --
Title Security through diversity /
Statement of responsibility Kevin Noble --
Title Reputation management /
Statement of responsibility Jean-Marc Seigneur --
Title Content filtering /
Statement of responsibility Peter Nicoletti --
Title Data loss protection /
Statement of responsibility Ken Perkins --
Miscellaneous information Appendix A:
Title Configuring authentication service on Microsoft Windows Vista /
Statement of responsibility John R. Vacca --
Miscellaneous information Appendix B:
Title Security management and resiliency /
Statement of responsibility John R. Vacca --
Miscellaneous information Appendix C:
Title List of top security implementation and deployment companies --
Miscellaneous information Appendix D:
Title List of security products --
Miscellaneous information Appendix E:
Title List of security standards --
Miscellaneous information Appendix F:
Title List of miscellaneous security resources --
Miscellaneous information Appendix G:
Title Ensuring built-in frequency hopping spread spectrum wireless network security --
Miscellaneous information Appendix H:
Title Configuring wireless internet security remote access --
Miscellaneous information Appendix I:
Title Frequently asked questions --
Miscellaneous information Appendix J: Glossary.
520 ## - SUMMARY, ETC.
Summary, etc This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book also covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems. From this book, the reader will also learn about applying the standards and technologies required to build secure VPNs, configure client software and server operating systems, IPsec-enabled routers, firewalls and SSL clients. Chapter coverage includes identifying vulnerabilities and implementing appropriate countermeasures to prevent and mitigate threats to mission-critical processes. Techniques are explored for creating a business continuity plan (BCP) and the methodology for building an infrastructure that supports its effective implementation. A public key infrastructure (PKI) is an increasingly critical component for ensuring confidentiality, integrity and authentication in an enterprise. This comprehensive book will provide essential knowledge and skills needed to select, design and deploy a PKI to secure existing and future applications. This book will include discussion of vulnerability scanners to detect security weaknesses and prevention techniques, as well as allowing access to key services while maintaining systems security. Chapters contributed by leaders in the field cover theory and practice of computer security technology, allowing the reader to develop a new level of technical expertise. This book's comprehensive and up-to-date coverage of security issues facilitates learning and allows the reader to remain current and fully informed from multiple viewpoints. & nbsp;Presents methods of analysis and problem-solving techniques, enhancing the readers grasp of the material and ability to implement practical solutions.
588 ## -
-- Description based on print version record.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS
General subdivision Internet
-- Security.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS
General subdivision Networking
-- Security.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS
General subdivision Security
-- General.
Source of heading or term bisacsh
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Electronic books.
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Vacca, John R.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Title Computer and information security handbook.
Place, publisher, and date of publication Amsterdam ; Boston : Elsevier ; Burlington, MA : Morgan Kaufmann, c2009
International Standard Book Number 9780123743541
Record control number (OCoLC)299240534
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Morgan Kaufmann series in computer security.
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified ScienceDirect
Uniform Resource Identifier http://www.sciencedirect.com/science/book/9780123743541
938 ## -
-- Books 24x7
-- B247
-- bks00032165
938 ## -
-- EBL - Ebook Library
-- EBLB
-- EBL453166
938 ## -
-- ebrary
-- EBRY
-- ebr10310757
938 ## -
-- EBSCOhost
-- EBSC
-- 248988
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type E-Books
994 ## -
-- 92
-- NITR

No items available.


Implemented and Maintained by Biju Patnaik Central Library.
For any Suggestions/Query Contact to library or Email: library@nitrkl.ac.in OR bpcl-cir@nitrkl.ac.in. Ph:91+6612462103
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha