000 08644cam a2201045 i 4500
001 ocn862041532
003 OCoLC
005 20240523125536.0
006 m o d
007 cr cnu---unuuu
008 131031s2014 nju ob 001 0 eng
010 _a 2013043853
040 _aDLC
_beng
_erda
_epn
_cDLC
_dYDX
_dN$T
_dOCLCO
_dYDXCP
_dOCLCO
_dCDX
_dB24X7
_dCOO
_dOCLCF
_dOCLCQ
_dOCLCO
_dE7B
_dEBLCP
_dTEFOD
_dAU@
_dDEBSZ
_dDG1
_dTEFOD
_dOCLCQ
_dDEBBG
_dDG1
_dCOCUF
_dCNNOR
_dLIP
_dZCU
_dLIV
_dMERUC
_dOCLCQ
_dU3W
_dUCO
_dOCLCQ
_dSTF
_dICG
_dNRAMU
_dINT
_dOCLCQ
_dWYU
_dUWO
_dG3B
_dVT2
_dOCLCQ
_dA6Q
_dDKC
_dOCLCQ
_dAZK
_dCRU
_dUX1
_dADU
_dUKAHL
_dOCLCQ
_dBRF
_dOCLCO
_dOCLCQ
_dOCLCO
_dOCLCL
019 _a874322357
_a880758875
_a889313753
_a961588893
_a974979085
_a975031940
_a981863775
_a992907272
_a1005947002
_a1018017280
_a1037750015
_a1043633405
_a1055365061
_a1069649890
_a1081266166
_a1083552890
_a1100568272
_a1101715072
_a1112875897
_a1119031673
_a1136537083
_a1225270012
_a1228618292
_a1257378113
020 _a9781118851791
_q(electronic bk.)
020 _a111885179X
_q(electronic bk.)
020 _a9781118851746
_q(electronic bk.)
020 _a1118851749
_q(electronic bk.)
020 _a9781118851678
_q(electronic bk.)
020 _a1118851676
_q(electronic bk.)
020 _z1118134109
_q(vol. 1 ;
_qpbk.)
020 _z9781118134108
_q(vol. 1 ;
_qpbk.)
020 _z1118134117
_q(vol. 2 ;
_qpbk.)
020 _z9781118134115
_q(vol. 2 ;
_qpbk.)
020 _z1118127064
_q(2 volume set ;
_qpbk.)
020 _z9781118127063
_q(2 volume set ;
_qpbk.)
020 _z9781118851722
_q(pdf)
020 _z1118851722
_q(pdf)
029 1 _aAU@
_b000052169937
029 1 _aAU@
_b000052901623
029 1 _aAU@
_b000053310544
029 1 _aCHNEW
_b000942486
029 1 _aCHVBK
_b480227756
029 1 _aDEBBG
_bBV043396316
029 1 _aDEBBG
_bBV044067374
029 1 _aDEBSZ
_b431653348
029 1 _aDEBSZ
_b468874127
029 1 _aGBVCP
_b780908694
035 _a(OCoLC)862041532
_z(OCoLC)874322357
_z(OCoLC)880758875
_z(OCoLC)889313753
_z(OCoLC)961588893
_z(OCoLC)974979085
_z(OCoLC)975031940
_z(OCoLC)981863775
_z(OCoLC)992907272
_z(OCoLC)1005947002
_z(OCoLC)1018017280
_z(OCoLC)1037750015
_z(OCoLC)1043633405
_z(OCoLC)1055365061
_z(OCoLC)1069649890
_z(OCoLC)1081266166
_z(OCoLC)1083552890
_z(OCoLC)1100568272
_z(OCoLC)1101715072
_z(OCoLC)1112875897
_z(OCoLC)1119031673
_z(OCoLC)1136537083
_z(OCoLC)1225270012
_z(OCoLC)1228618292
_z(OCoLC)1257378113
037 _a88D4DA59-9CCD-4F5D-8A15-814529620F68
_bOverDrive, Inc.
_nhttp://www.overdrive.com
042 _apcc
050 4 _aHF5548.37
_b.C64 2014
072 7 _aBUS
_x082000
_2bisacsh
072 7 _aBUS
_x041000
_2bisacsh
072 7 _aBUS
_x042000
_2bisacsh
072 7 _aBUS
_x085000
_2bisacsh
082 0 4 _a658.4/78
_223
049 _aMAIN
245 0 0 _aComputer security handbook /
_cedited by Seymour Bosworth, Michel E. Kabay, Eric Whyne.
250 _aSixth edition.
264 1 _aHoboken, New Jersey :
_bWiley,
_c[2014]
300 _a1 online resource (2 volumes)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
504 _aIncludes bibliographical references and index.
588 0 _aOnline resource; title from digital title page (viewed on April 24, 2014).
505 0 _aCOMPUTER SECURITY HANDBOOK (Volume 1); CONTENTS; PREFACE; ACKNOWLEDGMENTS; ABOUT THE EDITORS; ABOUT THE CONTRIBUTORS; A NOTE TO THE INSTRUCTOR; INTRODUCTION TO PART I: FOUNDATIONS OF COMPUTER SECURITY; CHAPTER 1 BRIEF HISTORY AND MISSION OF INFORMATION SYSTEM SECURITY; 1.1 INTRODUCTION TO INFORMATION SYSTEM SECURITY; 1.2 EVOLUTION OF INFORMATION SYSTEMS; 1.2.1 1950s: Punched-Card Systems; 1.2.2 Large-Scale Computers; 1.2.3 Medium-Size Computers; 1.2.4 1960s: Small-Scale Computers; 1.2.5 Transistors and Core Memory; 1.2.6 Time Sharing; 1.2.7 Real-Time, Online Systems.
505 8 _a1.2.8 A Family of Computers1.2.9 1970s: Microprocessors; 1.2.10 The First Personal Computers; 1.2.11 The First Network; 1.2.12 Further Security Considerations; 1.2.13 The First "Worm"; 1.2.14 1980s: Productivity Enhancements; 1.2.15 1980s: The Personal Computer; 1.2.16 Local Area Networks; 1.2.17 1990s: Interconnection; 1.2.18 1990s: Total Interconnection; 1.2.19 Telecommuting; 1.2.20 Internet and the World Wide Web; 1.2.21 Virtualization and the Cloud; 1.2.22 Supervisory Control and Data Acquisition; 1.3 GOVERNMENT RECOGNITION OF INFORMATION ASSURANCE; 1.3.1 IA Standards.
505 8 _a1.3.2 Computers at Risk1.3.3 InfraGard; 1.4 RECENT DEVELOPMENTS; 1.5 ONGOING MISSION FOR INFORMATION SYSTEM SECURITY; 1.6 NOTES; CHAPTER 2 HISTORY OF COMPUTER CRIME; 2.1 WHY STUDY HISTORICAL RECORDS?; 2.2 OVERVIEW; 2.3 1960S AND 1970S: SABOTAGE; 2.3.1 Direct Damage to Computer Centers; 2.3.2 1970-1972: Albert the Saboteur; 2.4 IMPERSONATION; 2.4.1 1970: Jerry Neal Schneider; 2.4.2 1980-2003: Kevin Mitnick; 2.4.3 Credit Card Fraud; 2.4.4 Identity Theft Rises; 2.5 PHONE PHREAKING; 2.5.1 2600 Hz; 2.5.2 1982-1991: Kevin Poulsen; 2.6 DATA DIDDLING; 2.6.1 Equity Funding Fraud (1964-1973).
505 8 _a2.6.2 1994: Vladimir Levin and the Citibank Heist2.7 SALAMI FRAUD; 2.8 LOGIC BOMBS; 2.9 EXTORTION; 2.10 TROJAN HORSES; 2.10.1 1988 Flu-Shot Hoax; 2.10.2 Scrambler, 12-Tricks, and PC Cyborg; 2.10.3 1994: Datacomp Hardware Trojan; 2.10.4 Keylogger Trojans; 2.10.5 Haephrati Trojan; 2.10.6 Hardware Trojans and Information Warfare; 2.11 NOTORIOUS WORMS AND VIRUSES; 2.11.1 1970-1990: Early Malware Outbreaks; 2.11.2 December 1987: Christmas Tree Worm; 2.11.3 November 2, 1988: Morris Worm; 2.11.4 Malware in the 1990s; 2.11.5 March 1999: Melissa; 2.11.6 May 2000: I Love You; 2.11.7 July 2010 Stuxnet.
505 8 _a2.12 SPAM 22.12.1 1994: Green Card Lottery Spam; 2.12.2 Spam Goes Global; 2.13 DENIAL OF SERVICE; 2.13.1 1996: Unamailer; 2.13.2 2000: MafiaBoy; 2.14 HACKER UNDERGROUND; 2.14.1 1981: Chaos Computer Club; 2.14.2 1982: The 414s; 2.14.3 1984: Cult of the Dead Cow; 2.14.4 1984: 2600: The Hacker Quarterly; 2.14.5 1984: Legion of Doom; 2.14.6 1985: Phrack; 2.14.7 1989: Masters of Deception; 2.14.8 1990: Operation Sundevil; 2.14.9 1990: Steve Jackson Games; 2.14.10 1992: L0pht Heavy Industries; 2.14.11 2004: Shadowcrew; 2.14.12 Late 2000s: Russian Business Network (RBN); 2.14.13 Anonymous.
520 _aComputer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written for professionals and college students, it provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more. This essential and highly-regarded r.
590 _aJohn Wiley and Sons
_bWiley Online Library: Complete oBooks
650 0 _aElectronic data processing departments
_xSecurity measures.
650 6 _aCentres de traitement de l'information
_xS�ecurit�e
_xMesures.
650 7 _aBUSINESS & ECONOMICS
_xIndustrial Management.
_2bisacsh
650 7 _aBUSINESS & ECONOMICS
_xManagement.
_2bisacsh
650 7 _aBUSINESS & ECONOMICS
_xManagement Science.
_2bisacsh
650 7 _aBUSINESS & ECONOMICS
_xOrganizational Behavior.
_2bisacsh
650 7 _aElectronic data processing departments
_xSecurity measures
_2fast
700 1 _aBosworth, Seymour,
_eeditor.
700 1 _aKabay, Michel E.,
_eeditor.
700 1 _aWhyne, Eric,
_d1981-
_eeditor.
758 _ihas work:
_aComputer security handbook (Text)
_1https://id.oclc.org/worldcat/entity/E39PCG8QCqmF699444r3R9yHkC
_4https://id.oclc.org/worldcat/ontology/hasWork
776 0 8 _iPrint version:
_tComputer security handbook.
_bSixth edition.
_dHoboken, New Jersey : John Wiley & Sons, Inc., [2014]
_z9781118134108
_w(DLC) 2013041083
_w(OCoLC)858361127
856 4 0 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781118851678
938 _aAskews and Holts Library Services
_bASKH
_nAH26312020
938 _aAskews and Holts Library Services
_bASKH
_nAH26312009
938 _aBooks 24x7
_bB247
_nbks00063501
938 _aCoutts Information Services
_bCOUT
_n27828122
938 _aEBL - Ebook Library
_bEBLB
_nEBL4039255
938 _aEBL - Ebook Library
_bEBLB
_nEBL1652940
938 _aebrary
_bEBRY
_nebr10851665
938 _aEBSCOhost
_bEBSC
_n719550
938 _aYBP Library Services
_bYANK
_n11715768
938 _aYBP Library Services
_bYANK
_n12677512
938 _aYBP Library Services
_bYANK
_n15281292
994 _a92
_bINLUM
999 _c12027
_d12027