Cyberspace and cybersecurity / (Record no. 23361)

MARC details
LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2012288209
ISBN
International Standard Book Number 9781466501331 (alk. paper)
ISBN
International Standard Book Number 1466501332 (alk. paper)
DEWEY DECIMAL CLASSIFICATION NUMBER
Call number 005.8 KO CY
MAIN ENTRY--PERSONAL AUTHOR
Authors Kostopoulos, George K.,
Dates 1939-
TITLE STATEMENT
Title Cyberspace and cybersecurity /
Statement of responsibility, etc. George K. Kostopoulos.
PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Boca Raton, Fl. :
Publisher CRC Press,
Date c2013.
PHYSICAL DESCRIPTION
Extent xvii, 218 p. ;
Other Details ill. :
Size 24 cm.
BIBLIOGRAPHY, ETC. NOTE
Note Includes bibliographical references and index.
SUMMARY
Summary Based on related courses and research on the cyber environment in Europe, the United States, and Asia, Cyberspace and Cybersecurity supplies complete coverage of cyberspace and cybersecurity. It not only emphasizes technologies but also pays close attention to human factors and organizational perspectives. Detailing guidelines for quantifying and measuring vulnerabilities, the book also explains how to avoid these vulnerabilities through secure coding. It covers organizational-related vulnerabilities, including access authorization, user authentication, and human factors in information security. Providing readers with the understanding required to build a secure enterprise, block intrusions, and handle delicate legal and ethical issues, the text: Examines the risks inherent in information system components, namely hardware, software, and people Explains why asset identification should be the cornerstone of any information security strategy Identifies the traits a CIO must have to address cybersecurity challenges Describes how to ensure business continuity in the event of adverse incidents, including acts of nature Considers intrusion detection and prevention systems (IDPS), focusing on configurations, capabilities, selection, management, and deployment Explaining how to secure a computer against malware and cyber attacks, the texte(tm)s wide-ranging coverage includes security analyzers, firewalls, antivirus software, file shredding, file encryption, and anti-loggers. It reviews international and U.S. federal laws and legal initiatives aimed at providing a legal infrastructure for what transpires over the Internet. The book concludes by examining the role of the U.S. Department of Homeland Security in our countrye(tm)s cyber preparedness. Exercises with solutions, updated references, electronic presentations, evaluation criteria for projects, guidelines to project preparations, and teaching suggestions are available upon qualified course adoption.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Computer security.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Cyberspace
General Security measures.
ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://uowd.box.com/s/txqrjlyxzuknfqfmikirkc6zqx0e9ip8">https://uowd.box.com/s/txqrjlyxzuknfqfmikirkc6zqx0e9ip8</a>
Public note Location Map
MAIN ENTRY--PERSONAL AUTHOR
-- 38699
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 641
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 38700
Holdings
Date last seen Total checkouts Total renewals Full call number Barcode Date last borrowed Cost, replacement price Price effective from Koha item type Lost status Source of classification or shelving scheme Damaged status Not for loan Withdrawn status Permanent location Current location Shelving location Date acquired Source of acquisition
29/11/2020 1 1 005.8 KO CY T0033085 08/10/2020 47.92 26/01/2017 REGULAR   Dewey Decimal Classification       University of Wollongong in Dubai University of Wollongong in Dubai Main Collection 10/04/2014 AMAUK