Computer security handbook : (Record no. 28775)

000 -LEADER
fixed length control field 05104cam a2200409 a 4500
FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 131025s2014 njua b 001 0 eng
LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2013041083
INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118134108
CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Modifying agency DLC
AUTHENTICATION CODE
Authentication code pcc
LIBRARY OF CONGRESS CALL NUMBER
Classification number HF5548.37
Item number .C64 2014
DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 658.4/78
Edition number 23
SYSTEM CONTROL NUMBER
System control number (IMchF)fol15011257
DATE AND TIME OF LATEST TRANSACTION
control field 20170126101051.0
CONTROL NUMBER
control field 63621
CONTROL NUMBER IDENTIFIER
control field UOWD
TITLE STATEMENT
Title Computer security handbook :
Remainder of title Vol. 1
Statement of responsibility, etc edited by Seymour Bosworth, Michel E. Kabay, Eric Whyne
EDITION STATEMENT
Edition statement 6th ed.
PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Hoboken, N.J. :
Name of publisher, distributor, etc John Wiley & Sons, Inc.,
Date of publication, distribution, etc c2014.
PHYSICAL DESCRIPTION
Extent xxxix, [various pagings] :
Other physical details ill. ;
Dimensions 26 cm.
BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
SUMMARY, ETC.
Summary, etc Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written for professionals and college students, it provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more. This essential and highly–regarded reference maintains timeless lessons and is fully revised and updated with current information on security issues for social networks, cloud computing, virtualization, and more.
FORMATTED CONTENTS NOTE
Formatted contents note COMPUTER SECURITY HANDBOOK (Volume 1); CONTENTS; PREFACE; ACKNOWLEDGMENTS; ABOUT THE EDITORS; ABOUT THE CONTRIBUTORS; A NOTE TO THE INSTRUCTOR; INTRODUCTION TO PART I: FOUNDATIONS OF COMPUTER SECURITY; CHAPTER 1 BRIEF HISTORY AND MISSION OF INFORMATION SYSTEM SECURITY; 1.1 INTRODUCTION TO INFORMATION SYSTEM SECURITY; 1.2 EVOLUTION OF INFORMATION SYSTEMS; 1.2.1 1950s: Punched-Card Systems; 1.2.2 Large-Scale Computers; 1.2.3 Medium-Size Computers; 1.2.4 1960s: Small-Scale Computers; 1.2.5 Transistors and Core Memory; 1.2.6 Time Sharing; 1.2.7 Real-Time, Online Systems. 1.2.8 A Family of Computers1.2.9 1970s: Microprocessors; 1.2.10 The First Personal Computers; 1.2.11 The First Network; 1.2.12 Further Security Considerations; 1.2.13 The First "Worm"; 1.2.14 1980s: Productivity Enhancements; 1.2.15 1980s: The Personal Computer; 1.2.16 Local Area Networks; 1.2.17 1990s: Interconnection; 1.2.18 1990s: Total Interconnection; 1.2.19 Telecommuting; 1.2.20 Internet and the World Wide Web; 1.2.21 Virtualization and the Cloud; 1.2.22 Supervisory Control and Data Acquisition; 1.3 GOVERNMENT RECOGNITION OF INFORMATION ASSURANCE; 1.3.1 IA Standards. 1.3.2 Computers at Risk1.3.3 InfraGard; 1.4 RECENT DEVELOPMENTS; 1.5 ONGOING MISSION FOR INFORMATION SYSTEM SECURITY; 1.6 NOTES; CHAPTER 2 HISTORY OF COMPUTER CRIME; 2.1 WHY STUDY HISTORICAL RECORDS?; 2.2 OVERVIEW; 2.3 1960S AND 1970S: SABOTAGE; 2.3.1 Direct Damage to Computer Centers; 2.3.2 1970-1972: Albert the Saboteur; 2.4 IMPERSONATION; 2.4.1 1970: Jerry Neal Schneider; 2.4.2 1980-2003: Kevin Mitnick; 2.4.3 Credit Card Fraud; 2.4.4 Identity Theft Rises; 2.5 PHONE PHREAKING; 2.5.1 2600 Hz; 2.5.2 1982-1991: Kevin Poulsen; 2.6 DATA DIDDLING; 2.6.1 Equity Funding Fraud (1964-1973). 2.6.2 1994: Vladimir Levin and the Citibank Heist2.7 SALAMI FRAUD; 2.8 LOGIC BOMBS; 2.9 EXTORTION; 2.10 TROJAN HORSES; 2.10.1 1988 Flu-Shot Hoax; 2.10.2 Scrambler, 12-Tricks, and PC Cyborg; 2.10.3 1994: Datacomp Hardware Trojan; 2.10.4 Keylogger Trojans; 2.10.5 Haephrati Trojan; 2.10.6 Hardware Trojans and Information Warfare; 2.11 NOTORIOUS WORMS AND VIRUSES; 2.11.1 1970-1990: Early Malware Outbreaks; 2.11.2 December 1987: Christmas Tree Worm; 2.11.3 November 2, 1988: Morris Worm; 2.11.4 Malware in the 1990s; 2.11.5 March 1999: Melissa; 2.11.6 May 2000: I Love You; 2.11.7 July 2010 Stuxnet. 2.12 SPAM 22.12.1 1994: Green Card Lottery Spam; 2.12.2 Spam Goes Global; 2.13 DENIAL OF SERVICE; 2.13.1 1996: Unamailer; 2.13.2 2000: MafiaBoy; 2.14 HACKER UNDERGROUND; 2.14.1 1981: Chaos Computer Club; 2.14.2 1982: The 414s; 2.14.3 1984: Cult of the Dead Cow; 2.14.4 1984: 2600: The Hacker Quarterly; 2.14.5 1984: Legion of Doom; 2.14.6 1985: Phrack; 2.14.7 1989: Masters of Deception; 2.14.8 1990: Operation Sundevil; 2.14.9 1990: Steve Jackson Games; 2.14.10 1992: L0pht Heavy Industries; 2.14.11 2004: Shadowcrew; 2.14.12 Late 2000s: Russian Business Network (RBN); 2.14.13 Anonymous.
STUDY PROGRAM INFORMATION NOTE
Program name CSCI358
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Electronic data processing departments
General subdivision Security measures
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element BUSINESS & ECONOMICS
General subdivision Industrial Management
Source of heading or term sears
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element BUSINESS & ECONOMICS
General subdivision Management
Source of heading or term sears
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element BUSINESS & ECONOMICS
General subdivision Management Science
Source of heading or term sears
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element BUSINESS & ECONOMICS
General subdivision Organizational Behavior
Source of heading or term sears
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
Source of heading or term sears
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection
Source of heading or term sears
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information technology
General subdivision Security measures
Source of heading or term sears
ADDED ENTRY--PERSONAL NAME
Personal name Bosworth, Seymour,
Relator term Edited by
ADDED ENTRY--PERSONAL NAME
Personal name Kabay, Michel E.,
Relator term Edited by
ADDED ENTRY--PERSONAL NAME
Personal name Whyne, Eric,
Relator term Edited by
ADDED ENTRY ELEMENTS (KOHA)
Koha item type REGULAR
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Source of acquisition Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type
        University of Wollongong in Dubai University of Wollongong in Dubai MAIN 2016-03-13 AMAUK 658.478 CO MP T0053978 2017-01-26 70.36 2017-01-26 REGULAR
        University of Wollongong in Dubai University of Wollongong in Dubai MAIN 2016-03-13 AMAUK 658.478 CO MP T0053979 2017-01-26 70.36 2017-01-26 REGULAR

Powered by Koha