Welcome to UE Central Library

Keep Smiling

The complete guide to Internet security (Record no. 16555)

MARC details
000 -LEADER
fixed length control field 01267cam a22002294a 4500
001 - CONTROL NUMBER
control field 11924884
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200903115716.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 000229s2000 nyua b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 081447070X
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780814470701
040 ## - CATALOGING SOURCE
Transcribing agency DLC
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 21
Item number M563
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Merkow, Mark S.
245 14 - TITLE STATEMENT
Title The complete guide to Internet security
Statement of responsibility, etc / Mark S. Merkow & James Breithaupt.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New York :
Name of publisher, distributor, etc AMACOM,
Date of publication, distribution, etc 2000
300 ## - PHYSICAL DESCRIPTION
Extent x, 356 p. :
Other physical details ill. ;
Dimensions 24 cm.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Internet
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Breithaupt, James,
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Building a foundation for information security<br/>2. The fundamental elements of security<br/>3. Vulnerabilities to internet-attached networks<br/>4. Hacking is not beyond the corporate perimeter<br/>5. Peeking inside a hacker's toolbox<br/>6. Instrumental effects for security assurance<br/>7. Security technologies<br/>8. Physical security control<br/>9. Logical access control<br/>10. Application layer security<br/>11. An introduction to cryptography<br/>12. Transport layer cryptography<br/>13. Digital signatures and ppk cryptography<br/>14. Key management considerations<br/>15. Multifactor access controls using cryptography<br/>16. Minding the store for the long run<br/>
Holdings
Withdrawn status Damaged status Not for loan Home library Current library Date acquired Source of acquisition Full call number Barcode Date last seen Price effective from Koha item type
      UE-Central Library UE-Central Library 03.12.2018 U.E.24159 005.8 M563 T9743 03.12.2018 03.12.2018 Books
Copyright © 2023, University of Education, Lahore. All Rights Reserved.
Email:centrallibrary@ue.edu.pk