MARC details
000 -LEADER |
fixed length control field |
01866cam a2200313 a 4500 |
001 - CONTROL NUMBER |
control field |
16037947 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20200826105357.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
091230s2010 nyua 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780071633758 (alk. paper) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0071633758 (alk. paper) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0071633774 (pbk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780071633772 (pbk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0071633782 (CDROM) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780071633789 (CDROM) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780070702356 |
040 ## - CATALOGING SOURCE |
Transcribing agency |
DLC |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
22 |
Item number |
C75211 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Conklin, Wm. Arthur |
245 00 - TITLE STATEMENT |
Title |
Principles of computer security : |
Remainder of title |
CompTIA security+ and beyond |
Statement of responsibility, etc |
/ Wm. Arthur Conklin ... [et al.]. |
250 ## - EDITION STATEMENT |
Edition statement |
2nd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
New Delhi : |
Name of publisher, distributor, etc |
Tata McGraw-Hill, |
Date of publication, distribution, etc |
2010 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxvii, 691 p. : |
Other physical details |
ill. (some col.) ; |
Dimensions |
28 cm. + |
Accompanying material |
1 CD-ROM (4 3/4 in.) |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security |
General subdivision |
Examinations |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Examinations |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer technicians |
General subdivision |
Certification |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Electronic data processing personnel |
General subdivision |
Certification. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Books |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
1. Introduction and security trends <br/>2. General security concepts <br/>3. Operational and organizational security <br/>4. The role of people in security <br/>5. Cryptography <br/>6. Public key infrastructure <br/>7. Standards and protocols <br/>8. Physical security <br/>9. Network fundamentals <br/>10. Infrastructure security <br/>11. Authentication and remote access <br/>12. Wireless security <br/>13. Intrusion detection systems and network security <br/>14. Baselines <br/>15. Types of attacks and malicious software <br/>16. E-mail and instant messaging <br/>17. Web components <br/>18. Secure software development <br/>19. Disaster recovering, business continuity, and organizational policies <br/>20. Risk management <br/>21. Change management <br/>22. Privilege management <br/>23. Computer forensics <br/>24. Legal issues and ethics <br/>25. Privacy objectives map : comptia security+.<br/> |