Computer security : (Record no. 674)

MARC details
000 -LEADER
fixed length control field 03132cam a2200385 i 4500
001 - CONTROL NUMBER
control field 15502869
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230531134425.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 081028s2010 maua b 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2008047272
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780763759940
Qualifying information paperback
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0763759945
Qualifying information paperback
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn265094835
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Modifying agency BTCTA
-- YDXCP
-- C#P
-- CDX
-- BWX
-- DLC
-- EG-CaTKH
Description conventions rda
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.D314
Item number N49 2010
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8 NE.C 2010 G.C
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Newman, Robert C.,
Relator term author.
245 10 - TITLE STATEMENT
Title Computer security :
Remainder of title protecting digital resources /
Statement of responsibility, etc. Robert C. Newman.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Sudbury, Massachusetts :
Name of producer, publisher, distributor, manufacturer Jones and Bartlett Publishers,
Date of production, publication, distribution, manufacture, or copyright notice 2010.
300 ## - PHYSICAL DESCRIPTION
Extent xxviii, 453 pages :
Other physical details illustrations ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (pages 443-445) and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cyber environment and security issues -- Attacks, threats, and vulnerabilities -- Scams, identity theft, and fraud -- Computer and digital assets security -- The internet and web network environment -- Wired and wireless local area networks -- Computer, server, and database security issues -- E-commerce security mechanisms -- Business continuity and disaster recovery planning -- Intrusion detection and prevention -- Problem solving and security administration -- Security solutions for digital resources -- Standards, specifications, and protocols -- Training, certifications, and careers.
520 ## - SUMMARY, ETC.
Summary, etc. "Today, society is faced with numerous internet schemes, fraudulent scams, and means of identity theft that threaten our safety and our peace of mind. Computer Security: Protecting Digital Resources provides a broad approach to computer-related crime, electronic commerce, corporate networking, and Internet security, topics that have become increasingly important as more and more threats are made on our internet environment. This book is oriented toward the average computer user, business professional, government worker, and those within the education community, with the expectation that readers can learn to use the network with some degree of safety and security. The author places emphasis on the numerous vulnerabilities and threats that are inherent in the Internet environment. Efforts are made to present techniques and suggestions to avoid identity theft and fraud." "Readers will gain a clear insight into the many security issues facing the e-commerce, networking, web, and internet environments, as well as what can be done to keep personal and business information secure."--Jacket.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Database security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Cataloger's name yomna.nassar
Cataloging process P
First Date, FD (RLIN) 20230531
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Cataloger's name mona.romia
Cataloging process R
First Date, FD (RLIN) 20230531
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Gift collections The Knowledge Hub Library The Knowledge Hub Library 02/21/2021   005.8 NE.C 2010 G.C 191611 02/21/2021 02/21/2021 Books