Cyber crime, security and digital intelligence / (Record no. 21931)

000 -LEADER
fixed length control field 01528nam a22003498a 4500
FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 130314s2013 enk b 001 0 eng
LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2013008805
INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781409454496
INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9781409454502 (ebook)
INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9781472403650 (epub)
CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
AUTHENTICATION CODE
Authentication code pcc
LIBRARY OF CONGRESS CALL NUMBER
Classification number HV6773
Item number .J64 2013
DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 658.4/78
Edition number 23
SYSTEM CONTROL NUMBER
System control number (IMchF)fol14688663
DATE AND TIME OF LATEST TRANSACTION
control field 20170126100152.0
CONTROL NUMBER
control field 54960
CONTROL NUMBER IDENTIFIER
control field UOWD
MAIN ENTRY--PERSONAL NAME
Personal name Johnson, Mark,
Dates associated with a name 1959-
TITLE STATEMENT
Title Cyber crime, security and digital intelligence /
Statement of responsibility, etc by Mark Johnson.
PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Farnham, Surrey :
Name of publisher, distributor, etc Gower Pub. Ltd.,
Date of publication, distribution, etc 2013.
PROJECTED PUBLICATION DATE
Projected publication date 1307
PHYSICAL DESCRIPTION
Extent xlv, 252 p. :
Other physical details ill. ;
Dimensions 25 cm.
BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
FORMATTED CONTENTS NOTE
Formatted contents note Threats to key sectors -- Cyber security fundamentals -- Cyber attack fundamentals -- Organised cyber attacks -- Cloud risks -- Web 2.0 risks -- Cyber security threat actors -- Common vulnerabilities -- Cyber security control frameworks -- Cyber security -- Digital intelligence -- The future of cyber security.
SUMMARY, ETC.
Summary, etc In Cyber Crime, Security and Digital Intelligence, his second book on high technology risks, Mark Johnson goes far beyond enumerating past cases and summarising the requirements of data protection law, payment card industry or ISO standards.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cyberterrorism.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
ADDED ENTRY ELEMENTS (KOHA)
Koha item type REGULAR
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Source of acquisition Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type
        University of Wollongong in Dubai University of Wollongong in Dubai MAIN 2013-11-05 AMAUK 658.478 JO CY T0049259 2017-01-26 65.00 2017-01-26 REGULAR

Powered by Koha