000 | 08644cam a2201045 i 4500 | ||
---|---|---|---|
001 | ocn862041532 | ||
003 | OCoLC | ||
005 | 20240523125536.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 131031s2014 nju ob 001 0 eng | ||
010 | _a 2013043853 | ||
040 |
_aDLC _beng _erda _epn _cDLC _dYDX _dN$T _dOCLCO _dYDXCP _dOCLCO _dCDX _dB24X7 _dCOO _dOCLCF _dOCLCQ _dOCLCO _dE7B _dEBLCP _dTEFOD _dAU@ _dDEBSZ _dDG1 _dTEFOD _dOCLCQ _dDEBBG _dDG1 _dCOCUF _dCNNOR _dLIP _dZCU _dLIV _dMERUC _dOCLCQ _dU3W _dUCO _dOCLCQ _dSTF _dICG _dNRAMU _dINT _dOCLCQ _dWYU _dUWO _dG3B _dVT2 _dOCLCQ _dA6Q _dDKC _dOCLCQ _dAZK _dCRU _dUX1 _dADU _dUKAHL _dOCLCQ _dBRF _dOCLCO _dOCLCQ _dOCLCO _dOCLCL |
||
019 |
_a874322357 _a880758875 _a889313753 _a961588893 _a974979085 _a975031940 _a981863775 _a992907272 _a1005947002 _a1018017280 _a1037750015 _a1043633405 _a1055365061 _a1069649890 _a1081266166 _a1083552890 _a1100568272 _a1101715072 _a1112875897 _a1119031673 _a1136537083 _a1225270012 _a1228618292 _a1257378113 |
||
020 |
_a9781118851791 _q(electronic bk.) |
||
020 |
_a111885179X _q(electronic bk.) |
||
020 |
_a9781118851746 _q(electronic bk.) |
||
020 |
_a1118851749 _q(electronic bk.) |
||
020 |
_a9781118851678 _q(electronic bk.) |
||
020 |
_a1118851676 _q(electronic bk.) |
||
020 |
_z1118134109 _q(vol. 1 ; _qpbk.) |
||
020 |
_z9781118134108 _q(vol. 1 ; _qpbk.) |
||
020 |
_z1118134117 _q(vol. 2 ; _qpbk.) |
||
020 |
_z9781118134115 _q(vol. 2 ; _qpbk.) |
||
020 |
_z1118127064 _q(2 volume set ; _qpbk.) |
||
020 |
_z9781118127063 _q(2 volume set ; _qpbk.) |
||
020 |
_z9781118851722 _q(pdf) |
||
020 |
_z1118851722 _q(pdf) |
||
029 | 1 |
_aAU@ _b000052169937 |
|
029 | 1 |
_aAU@ _b000052901623 |
|
029 | 1 |
_aAU@ _b000053310544 |
|
029 | 1 |
_aCHNEW _b000942486 |
|
029 | 1 |
_aCHVBK _b480227756 |
|
029 | 1 |
_aDEBBG _bBV043396316 |
|
029 | 1 |
_aDEBBG _bBV044067374 |
|
029 | 1 |
_aDEBSZ _b431653348 |
|
029 | 1 |
_aDEBSZ _b468874127 |
|
029 | 1 |
_aGBVCP _b780908694 |
|
035 |
_a(OCoLC)862041532 _z(OCoLC)874322357 _z(OCoLC)880758875 _z(OCoLC)889313753 _z(OCoLC)961588893 _z(OCoLC)974979085 _z(OCoLC)975031940 _z(OCoLC)981863775 _z(OCoLC)992907272 _z(OCoLC)1005947002 _z(OCoLC)1018017280 _z(OCoLC)1037750015 _z(OCoLC)1043633405 _z(OCoLC)1055365061 _z(OCoLC)1069649890 _z(OCoLC)1081266166 _z(OCoLC)1083552890 _z(OCoLC)1100568272 _z(OCoLC)1101715072 _z(OCoLC)1112875897 _z(OCoLC)1119031673 _z(OCoLC)1136537083 _z(OCoLC)1225270012 _z(OCoLC)1228618292 _z(OCoLC)1257378113 |
||
037 |
_a88D4DA59-9CCD-4F5D-8A15-814529620F68 _bOverDrive, Inc. _nhttp://www.overdrive.com |
||
042 | _apcc | ||
050 | 4 |
_aHF5548.37 _b.C64 2014 |
|
072 | 7 |
_aBUS _x082000 _2bisacsh |
|
072 | 7 |
_aBUS _x041000 _2bisacsh |
|
072 | 7 |
_aBUS _x042000 _2bisacsh |
|
072 | 7 |
_aBUS _x085000 _2bisacsh |
|
082 | 0 | 4 |
_a658.4/78 _223 |
049 | _aMAIN | ||
245 | 0 | 0 |
_aComputer security handbook / _cedited by Seymour Bosworth, Michel E. Kabay, Eric Whyne. |
250 | _aSixth edition. | ||
264 | 1 |
_aHoboken, New Jersey : _bWiley, _c[2014] |
|
300 | _a1 online resource (2 volumes) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
504 | _aIncludes bibliographical references and index. | ||
588 | 0 | _aOnline resource; title from digital title page (viewed on April 24, 2014). | |
505 | 0 | _aCOMPUTER SECURITY HANDBOOK (Volume 1); CONTENTS; PREFACE; ACKNOWLEDGMENTS; ABOUT THE EDITORS; ABOUT THE CONTRIBUTORS; A NOTE TO THE INSTRUCTOR; INTRODUCTION TO PART I: FOUNDATIONS OF COMPUTER SECURITY; CHAPTER 1 BRIEF HISTORY AND MISSION OF INFORMATION SYSTEM SECURITY; 1.1 INTRODUCTION TO INFORMATION SYSTEM SECURITY; 1.2 EVOLUTION OF INFORMATION SYSTEMS; 1.2.1 1950s: Punched-Card Systems; 1.2.2 Large-Scale Computers; 1.2.3 Medium-Size Computers; 1.2.4 1960s: Small-Scale Computers; 1.2.5 Transistors and Core Memory; 1.2.6 Time Sharing; 1.2.7 Real-Time, Online Systems. | |
505 | 8 | _a1.2.8 A Family of Computers1.2.9 1970s: Microprocessors; 1.2.10 The First Personal Computers; 1.2.11 The First Network; 1.2.12 Further Security Considerations; 1.2.13 The First "Worm"; 1.2.14 1980s: Productivity Enhancements; 1.2.15 1980s: The Personal Computer; 1.2.16 Local Area Networks; 1.2.17 1990s: Interconnection; 1.2.18 1990s: Total Interconnection; 1.2.19 Telecommuting; 1.2.20 Internet and the World Wide Web; 1.2.21 Virtualization and the Cloud; 1.2.22 Supervisory Control and Data Acquisition; 1.3 GOVERNMENT RECOGNITION OF INFORMATION ASSURANCE; 1.3.1 IA Standards. | |
505 | 8 | _a1.3.2 Computers at Risk1.3.3 InfraGard; 1.4 RECENT DEVELOPMENTS; 1.5 ONGOING MISSION FOR INFORMATION SYSTEM SECURITY; 1.6 NOTES; CHAPTER 2 HISTORY OF COMPUTER CRIME; 2.1 WHY STUDY HISTORICAL RECORDS?; 2.2 OVERVIEW; 2.3 1960S AND 1970S: SABOTAGE; 2.3.1 Direct Damage to Computer Centers; 2.3.2 1970-1972: Albert the Saboteur; 2.4 IMPERSONATION; 2.4.1 1970: Jerry Neal Schneider; 2.4.2 1980-2003: Kevin Mitnick; 2.4.3 Credit Card Fraud; 2.4.4 Identity Theft Rises; 2.5 PHONE PHREAKING; 2.5.1 2600 Hz; 2.5.2 1982-1991: Kevin Poulsen; 2.6 DATA DIDDLING; 2.6.1 Equity Funding Fraud (1964-1973). | |
505 | 8 | _a2.6.2 1994: Vladimir Levin and the Citibank Heist2.7 SALAMI FRAUD; 2.8 LOGIC BOMBS; 2.9 EXTORTION; 2.10 TROJAN HORSES; 2.10.1 1988 Flu-Shot Hoax; 2.10.2 Scrambler, 12-Tricks, and PC Cyborg; 2.10.3 1994: Datacomp Hardware Trojan; 2.10.4 Keylogger Trojans; 2.10.5 Haephrati Trojan; 2.10.6 Hardware Trojans and Information Warfare; 2.11 NOTORIOUS WORMS AND VIRUSES; 2.11.1 1970-1990: Early Malware Outbreaks; 2.11.2 December 1987: Christmas Tree Worm; 2.11.3 November 2, 1988: Morris Worm; 2.11.4 Malware in the 1990s; 2.11.5 March 1999: Melissa; 2.11.6 May 2000: I Love You; 2.11.7 July 2010 Stuxnet. | |
505 | 8 | _a2.12 SPAM 22.12.1 1994: Green Card Lottery Spam; 2.12.2 Spam Goes Global; 2.13 DENIAL OF SERVICE; 2.13.1 1996: Unamailer; 2.13.2 2000: MafiaBoy; 2.14 HACKER UNDERGROUND; 2.14.1 1981: Chaos Computer Club; 2.14.2 1982: The 414s; 2.14.3 1984: Cult of the Dead Cow; 2.14.4 1984: 2600: The Hacker Quarterly; 2.14.5 1984: Legion of Doom; 2.14.6 1985: Phrack; 2.14.7 1989: Masters of Deception; 2.14.8 1990: Operation Sundevil; 2.14.9 1990: Steve Jackson Games; 2.14.10 1992: L0pht Heavy Industries; 2.14.11 2004: Shadowcrew; 2.14.12 Late 2000s: Russian Business Network (RBN); 2.14.13 Anonymous. | |
520 | _aComputer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written for professionals and college students, it provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more. This essential and highly-regarded r. | ||
590 |
_aJohn Wiley and Sons _bWiley Online Library: Complete oBooks |
||
650 | 0 |
_aElectronic data processing departments _xSecurity measures. |
|
650 | 6 |
_aCentres de traitement de l'information _xS�ecurit�e _xMesures. |
|
650 | 7 |
_aBUSINESS & ECONOMICS _xIndustrial Management. _2bisacsh |
|
650 | 7 |
_aBUSINESS & ECONOMICS _xManagement. _2bisacsh |
|
650 | 7 |
_aBUSINESS & ECONOMICS _xManagement Science. _2bisacsh |
|
650 | 7 |
_aBUSINESS & ECONOMICS _xOrganizational Behavior. _2bisacsh |
|
650 | 7 |
_aElectronic data processing departments _xSecurity measures _2fast |
|
700 | 1 |
_aBosworth, Seymour, _eeditor. |
|
700 | 1 |
_aKabay, Michel E., _eeditor. |
|
700 | 1 |
_aWhyne, Eric, _d1981- _eeditor. |
|
758 |
_ihas work: _aComputer security handbook (Text) _1https://id.oclc.org/worldcat/entity/E39PCG8QCqmF699444r3R9yHkC _4https://id.oclc.org/worldcat/ontology/hasWork |
||
776 | 0 | 8 |
_iPrint version: _tComputer security handbook. _bSixth edition. _dHoboken, New Jersey : John Wiley & Sons, Inc., [2014] _z9781118134108 _w(DLC) 2013041083 _w(OCoLC)858361127 |
856 | 4 | 0 | _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781118851678 |
938 |
_aAskews and Holts Library Services _bASKH _nAH26312020 |
||
938 |
_aAskews and Holts Library Services _bASKH _nAH26312009 |
||
938 |
_aBooks 24x7 _bB247 _nbks00063501 |
||
938 |
_aCoutts Information Services _bCOUT _n27828122 |
||
938 |
_aEBL - Ebook Library _bEBLB _nEBL4039255 |
||
938 |
_aEBL - Ebook Library _bEBLB _nEBL1652940 |
||
938 |
_aebrary _bEBRY _nebr10851665 |
||
938 |
_aEBSCOhost _bEBSC _n719550 |
||
938 |
_aYBP Library Services _bYANK _n11715768 |
||
938 |
_aYBP Library Services _bYANK _n12677512 |
||
938 |
_aYBP Library Services _bYANK _n15281292 |
||
994 |
_a92 _bINLUM |
||
999 |
_c12027 _d12027 |