MARC details
000 -LEADER |
fixed length control field |
04097nam a2200349 i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
CUTN |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20180219150242.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
120612s2013 nyua 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781259098345 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780071784351 (pbk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0071784357 (pbk.) |
038 ## - RECORD CONTENT LICENSOR |
Record content licensor |
OCoLC |
041 ## - LANGUAGE CODE |
Language |
English |
049 ## - LOCAL HOLDINGS (OCLC) |
Local processing data |
o |
Missing elements |
2 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
Item number |
OUS |
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (OCLC) |
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) |
Ntm |
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) |
QA76.9.A25 RHO |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Rhodes-Ousley, Mark, |
245 10 - TITLE STATEMENT |
Title |
Information security : |
Remainder of title |
the complete reference / |
Statement of responsibility, etc |
Mark Rhodes-Ousley. |
250 ## - EDITION STATEMENT |
Edition statement |
Second edition. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
India |
Name of publisher, distributor, etc |
McGraw Hill Education |
Date of publication, distribution, etc |
2013 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxxix, 854 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm |
500 ## - GENERAL NOTE |
General note |
Develop and implement an effective end-to-end security program Today's complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information Security: The Complete Reference, Second Edition (previously titled Network Security: The Complete Reference) is the only comprehensive book that offers vendor-neutral details on all aspects of information protection, with an eye toward the evolving threat landscape. Thoroughly revised and expanded to cover all aspects of modern information security-from concepts to details-this edition provides a one-stop reference equally applicable to the beginner and the seasoned professional. Find out how to build a holistic security program based on proven methodology, risk analysis, compliance, and business needs. You'll learn how to successfully protect data, networks, computers, and applications.<br/>In-depth chapters cover data protection, encryption, information rights management, network security, intrusion detection and prevention, Unix and Windows security, virtual and cloud security, secure application development, disaster recovery, forensics, and real-world attacks and countermeasures. Included is an extensive security glossary, as well as standards-based references. This is a great resource for professionals and students alike. Understand security concepts and building blocks Identify vulnerabilities and mitigate risk Optimize authentication and authorization Use IRM and encryption to protect unstructured data Defend storage devices, databases, and software Protect network routers, switches, and firewalls Secure VPN, wireless, VoIP, and PBX infrastructure Design intrusion detection and prevention systems Develop secure Windows, Java, and mobile applications Perform incident response and forensic analysis |
505 ## - FORMATTED CONTENTS NOTE |
Contents |
Part I Foundations 1 Information Security Overview 2 Risk Analysis 3 Compliance with Standards, Regulations, and Laws 4 Secure Design Principles 5 Security Policies, Standards, Procedures, and Guidelines 6 Security Organization 7 Authentication and Authorization Part II Data Security 8 Securing Unstructured Data 9 Information Rights Management 10 Encryption 11 Storage Security 12 Database Security Part III Network Security 13 Secure Network Design 14 Network Device Security 15 Firewalls 16 Virtual Private Networks 17 Wireless Network Security 18 Intrusion Detection and Prevention Systems 19 Voice over IP (VoIP) and PBX Security Part IV Computer Security 20 Operating System Security Models 21 Unix Security 22 Windows Security 23 Securing Infrastructure Services 24 Virtual Machines and Cloud Computing 25 Securing Mobile Devices Part V Application Security 26 Secure Application Design 27 Writing Secure Software 28 J2EE Security 29 Windows .NET Security 30 Controlling Application Behavior Part VI Security Operations 31 Security Operations Management 32 Disaster Recovery, Business Continuity, Backups, and High Availability 33 Incident Response and Forensic Analysis Part VII Physical Security 34 Physical Security |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
General Books |
100 1# - MAIN ENTRY--PERSONAL NAME |
Relator term |
author. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
General subdivision |
Security measures |
Form subdivision |
Handbooks, manuals, etc. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Form subdivision |
Handbooks, manuals, etc. |