Information security : (Record no. 24502)

MARC details
000 -LEADER
fixed length control field 04097nam a2200349 i 4500
003 - CONTROL NUMBER IDENTIFIER
control field CUTN
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20180219150242.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 120612s2013 nyua 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781259098345
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780071784351 (pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0071784357 (pbk.)
038 ## - RECORD CONTENT LICENSOR
Record content licensor OCoLC
041 ## - LANGUAGE CODE
Language English
049 ## - LOCAL HOLDINGS (OCLC)
Local processing data o
Missing elements 2
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
Item number OUS
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (OCLC)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) Ntm
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) QA76.9.A25 RHO
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Rhodes-Ousley, Mark,
245 10 - TITLE STATEMENT
Title Information security :
Remainder of title the complete reference /
Statement of responsibility, etc Mark Rhodes-Ousley.
250 ## - EDITION STATEMENT
Edition statement Second edition.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc India
Name of publisher, distributor, etc McGraw Hill Education
Date of publication, distribution, etc 2013
300 ## - PHYSICAL DESCRIPTION
Extent xxxix, 854 pages :
Other physical details illustrations ;
Dimensions 24 cm
500 ## - GENERAL NOTE
General note Develop and implement an effective end-to-end security program Today's complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information Security: The Complete Reference, Second Edition (previously titled Network Security: The Complete Reference) is the only comprehensive book that offers vendor-neutral details on all aspects of information protection, with an eye toward the evolving threat landscape. Thoroughly revised and expanded to cover all aspects of modern information security-from concepts to details-this edition provides a one-stop reference equally applicable to the beginner and the seasoned professional. Find out how to build a holistic security program based on proven methodology, risk analysis, compliance, and business needs. You'll learn how to successfully protect data, networks, computers, and applications.<br/>In-depth chapters cover data protection, encryption, information rights management, network security, intrusion detection and prevention, Unix and Windows security, virtual and cloud security, secure application development, disaster recovery, forensics, and real-world attacks and countermeasures. Included is an extensive security glossary, as well as standards-based references. This is a great resource for professionals and students alike. Understand security concepts and building blocks Identify vulnerabilities and mitigate risk Optimize authentication and authorization Use IRM and encryption to protect unstructured data Defend storage devices, databases, and software Protect network routers, switches, and firewalls Secure VPN, wireless, VoIP, and PBX infrastructure Design intrusion detection and prevention systems Develop secure Windows, Java, and mobile applications Perform incident response and forensic analysis
505 ## - FORMATTED CONTENTS NOTE
Contents Part I Foundations 1 Information Security Overview 2 Risk Analysis 3 Compliance with Standards, Regulations, and Laws 4 Secure Design Principles 5 Security Policies, Standards, Procedures, and Guidelines 6 Security Organization 7 Authentication and Authorization Part II Data Security 8 Securing Unstructured Data 9 Information Rights Management 10 Encryption 11 Storage Security 12 Database Security Part III Network Security 13 Secure Network Design 14 Network Device Security 15 Firewalls 16 Virtual Private Networks 17 Wireless Network Security 18 Intrusion Detection and Prevention Systems 19 Voice over IP (VoIP) and PBX Security Part IV Computer Security 20 Operating System Security Models 21 Unix Security 22 Windows Security 23 Securing Infrastructure Services 24 Virtual Machines and Cloud Computing 25 Securing Mobile Devices Part V Application Security 26 Secure Application Design 27 Writing Secure Software 28 J2EE Security 29 Windows .NET Security 30 Controlling Application Behavior Part VI Security Operations 31 Security Operations Management 32 Disaster Recovery, Business Continuity, Backups, and High Availability 33 Incident Response and Forensic Analysis Part VII Physical Security 34 Physical Security
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type General Books
100 1# - MAIN ENTRY--PERSONAL NAME
Relator term author.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
General subdivision Security measures
Form subdivision Handbooks, manuals, etc.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Form subdivision Handbooks, manuals, etc.
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Location Shelving location Date of Cataloging Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type Date checked out
    Dewey Decimal Classification     Non-fiction CUTN Central Library CUTN Central Library Generalia 19/02/2018   005.8 OUS 29622 19/02/2018 19/02/2018 General Books  
    Dewey Decimal Classification     Non-fiction CUTN Central Library CUTN Central Library Generalia 19/02/2018   005.8 OUS 29623 18/01/2024 19/02/2018 General Books  
    Dewey Decimal Classification     Non-fiction CUTN Central Library CUTN Central Library Generalia 19/02/2018 2 005.8 OUS 29624 25/01/2024 19/02/2018 General Books 21/02/2020
    Dewey Decimal Classification     Non-fiction CUTN Central Library CUTN Central Library Generalia 19/02/2018   005.8 OUS 29625 19/02/2018 19/02/2018 General Books  
    Dewey Decimal Classification     Reference CUTN Central Library CUTN Central Library Reference 19/02/2018   005.8 OUS 29626 19/02/2018 19/02/2018 Reference Books  

Powered by Koha