000 -LEADER |
fixed length control field |
01528nam a22003498a 4500 |
FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
130314s2013 enk b 001 0 eng |
LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2013008805 |
INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781409454496 |
INTERNATIONAL STANDARD BOOK NUMBER |
Cancelled/invalid ISBN |
9781409454502 (ebook) |
INTERNATIONAL STANDARD BOOK NUMBER |
Cancelled/invalid ISBN |
9781472403650 (epub) |
CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
AUTHENTICATION CODE |
Authentication code |
pcc |
LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
HV6773 |
Item number |
.J64 2013 |
DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
658.4/78 |
Edition number |
23 |
SYSTEM CONTROL NUMBER |
System control number |
(IMchF)fol14688663 |
DATE AND TIME OF LATEST TRANSACTION |
control field |
20170126100152.0 |
CONTROL NUMBER |
control field |
54960 |
CONTROL NUMBER IDENTIFIER |
control field |
UOWD |
MAIN ENTRY--PERSONAL NAME |
Personal name |
Johnson, Mark, |
Dates associated with a name |
1959- |
TITLE STATEMENT |
Title |
Cyber crime, security and digital intelligence / |
Statement of responsibility, etc |
by Mark Johnson. |
PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Farnham, Surrey : |
Name of publisher, distributor, etc |
Gower Pub. Ltd., |
Date of publication, distribution, etc |
2013. |
PROJECTED PUBLICATION DATE |
Projected publication date |
1307 |
PHYSICAL DESCRIPTION |
Extent |
xlv, 252 p. : |
Other physical details |
ill. ; |
Dimensions |
25 cm. |
BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
FORMATTED CONTENTS NOTE |
Formatted contents note |
Threats to key sectors -- Cyber security fundamentals -- Cyber attack fundamentals -- Organised cyber attacks -- Cloud risks -- Web 2.0 risks -- Cyber security threat actors -- Common vulnerabilities -- Cyber security control frameworks -- Cyber security -- Digital intelligence -- The future of cyber security. |
SUMMARY, ETC. |
Summary, etc |
In Cyber Crime, Security and Digital Intelligence, his second book on high technology risks, Mark Johnson goes far beyond enumerating past cases and summarising the requirements of data protection law, payment card industry or ISO standards. |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer crimes. |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Cyberterrorism. |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures. |
ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
REGULAR |