Cyber security essentials / (Record no. 22343)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01453nam a2200253 a 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20140310183402.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 121005s19uu xx 00 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781439851234 |
| 050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
| Classification number | TK 5105.59 |
| Item number | .C994 2011 |
| 245 ## - TITLE STATEMENT | |
| Title | Cyber security essentials / |
| Statement of responsibility, etc | edited by James Graham, Richard Howard, and Ryan Olson. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication, distribution, etc | Boca Raton, FL : |
| Name of publisher, distributor, etc | Auerbach Publications, |
| Date of publication, distribution, etc | 2011. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 325 p. : |
| Other physical details | ill. ; |
| Dimensions | 23 cm. |
| 500 ## - GENERAL NOTE | |
| General note | Includes bibliographical references and index. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | "A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks"-- Provided by publisher. |
| 521 ## - TARGET AUDIENCE NOTE | |
| Target audience note | |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Computer security |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | BUSINESS & ECONOMICS / Management |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | COMPUTERS / Information Technology |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | COMPUTERS / Security / General |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Howard, Richard |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Olson, Ryan |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | Books |
| Source of classification or shelving scheme | Library of Congress Classification |
| Call number prefix | Foreign |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Total Checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Library of Congress Classification | College Library | College Library | General Circulation Section | 10/05/2012 | Donation | 4048.00 | TK 5105.59 .C994 2011 | C16285 | 05/15/2018 | 1 | 10/10/2013 | Books |