Computer security : (Record no. 3271)

MARC details
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100303s2010 mau a 000 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2008047272
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780763759940 (pbk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) u4272
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Newman, Robert C.
9 (RLIN) 4641
245 10 - TITLE STATEMENT
Title Computer security :
Remainder of title protecting digital resources /
Statement of responsibility, etc. Robert C. Newman.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Sudbury, Mass. :
Name of publisher, distributor, etc. Jones and Bartlett Publishers,
Date of publication, distribution, etc. c2010.
300 ## - PHYSICAL DESCRIPTION
Extent xxviii, 453 p. :
Other physical details ill. ;
Dimensions 24 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (p. 443-445) and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cyber Environment and Security Issues -- Attacks, Threats, and Vulnerabilities -- Scams, Identity Theft, and Fraud -- Computer and Digital Assets Security -- The Internet and Web Network Environment -- Wired and Wireless Local Area Networks -- Computer, Server, and Database Security Issues -- E-Commerce Security Mechanisms -- Business Continuity and Disaster Recovery Planning -- Intrusion Detection and Prevention -- Problem Solving and Security Administration -- Security Solutions for Digital Resources -- Standards, Specifications, and Protocols -- Training, Certifications, and Careers.
520 ## - SUMMARY, ETC.
Summary, etc. Today, society is faced with numerous internet schemes, fraudulent scams, and means of identity theft that threaten our safety and our peace of mind. Computer Security: Protecting Digital Resources provides a broad approach to computer-related crime, electronic commerce, corporate networking, and Internet security, topics that have become increasingly important as more and more threats are made on our internet environment. This book is oriented toward the average computer user, business professional, government worker, and those within the education community, with the expectation that readers can learn to use the network with some degree of safety and security. The author places emphasis on the numerous vulnerabilities and threats that are inherent in the Internet environment. Efforts are made to present techniques and suggestions to avoid identity theft and fraud.
596 ## -
-- 1
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Database security.
9 (RLIN) 8499
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
9 (RLIN) 8500
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
9 (RLIN) 8501
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Digital Assets Security
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Web Network
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Wired and Wireless
920 ## -
-- 0763759945 (pbk.)
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main library Main library General Stacks 01/26/2020 ACA-P   005.8 / NE.C 2010 006594 11/24/2019 1 11/24/2019 Books