Security strategies in Linux platforms and applications / (Record no. 29848)

MARC details
000 -LEADER
fixed length control field 02033cam a2200325 i 4500
003 - CONTROL NUMBER IDENTIFIER
control field CUTN
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190820154426.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 150722t20172017maua b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781284090659
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1284090655
041 ## - LANGUAGE CODE
Language English
042 ## - AUTHENTICATION CODE
Authentication code pcc
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
Item number JAN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Jang, Michael H.
245 10 - TITLE STATEMENT
Title Security strategies in Linux platforms and applications /
Statement of responsibility, etc Michael Jang and Ric Messier.
250 ## - EDITION STATEMENT
Edition statement Second edition.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Burlington, MA :
Name of publisher, distributor, etc Jones & Bartlett Learning,
Date of publication, distribution, etc 2017.
300 ## - PHYSICAL DESCRIPTION
Extent xxiii, 514 pages :
Other physical details illustrations ;
Dimensions 23 cm
505 0# - FORMATTED CONTENTS NOTE
Contents Security threats to Linux -- Basic components of Linux security -- Basic security : facilities through the boot process -- User privileges and permissions -- Filesystems, volumes, and encryption -- Every service is a potential risk -- Networks, firewalls, and more -- Networked filesystems and remote access -- Networked application security -- Kernel security risk mitigation -- Managing security alerts and updates -- Building and maintaining a security baseline -- Testing and reporting -- Detecting and responding to security breaches -- Best practices and emerging technologies.
520 ## - SUMMARY, ETC.
Summary, etc "The Second Edition of Security Strategies in Linux Platforms and Applications opens with a discussion of risks, threats, and vulnerabilities. Part 2 discusses how to take advantage of the layers of security and the modules associated with AppArmor and SELinux. Part 3 looks at the use of open source and proprietary tools when building a layered security strategy"--
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Operating systems (Computers)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Messier, Ric.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type General Books
490 0# - SERIES STATEMENT
Series statement Jones & Bartlett Learning information systems security & assurance series
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE
Uniform title Linux.
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Location Shelving location Date of Cataloging Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Non-fiction CUTN Central Library CUTN Central Library Generalia 20/08/2019   005.8 JAN 37340 20/08/2019 20/08/2019 General Books
    Dewey Decimal Classification     Non-fiction CUTN Central Library CUTN Central Library Generalia 19/05/2025   005.8 JAN 51497 19/05/2025 19/05/2025 General Books