The complete guide to Internet security (Record no. 16555)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01267cam a22002294a 4500 |
001 - CONTROL NUMBER | |
control field | 11924884 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200903115716.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 000229s2000 nyua b 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 081447070X |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780814470701 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | DLC |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 21 |
Item number | M563 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Merkow, Mark S. |
245 14 - TITLE STATEMENT | |
Title | The complete guide to Internet security |
Statement of responsibility, etc | / Mark S. Merkow & James Breithaupt. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | New York : |
Name of publisher, distributor, etc | AMACOM, |
Date of publication, distribution, etc | 2000 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | x, 356 p. : |
Other physical details | ill. ; |
Dimensions | 24 cm. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Internet |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Breithaupt, James, |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Books |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 1. Building a foundation for information security<br/>2. The fundamental elements of security<br/>3. Vulnerabilities to internet-attached networks<br/>4. Hacking is not beyond the corporate perimeter<br/>5. Peeking inside a hacker's toolbox<br/>6. Instrumental effects for security assurance<br/>7. Security technologies<br/>8. Physical security control<br/>9. Logical access control<br/>10. Application layer security<br/>11. An introduction to cryptography<br/>12. Transport layer cryptography<br/>13. Digital signatures and ppk cryptography<br/>14. Key management considerations<br/>15. Multifactor access controls using cryptography<br/>16. Minding the store for the long run<br/> |
Withdrawn status | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|
UE-Central Library | UE-Central Library | 03.12.2018 | U.E.24159 | 005.8 M563 | T9743 | 03.12.2018 | 03.12.2018 | Books |