Computer and Information Security Handbook (notice n° 1556474)
[ vue normale ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02546cam a2200277zu 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | FRCYB88972941 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20251020124135.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 251020s2017 fr | o|||||0|0|||eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9780128038437 |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | FRCYB88972941 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | FR-PaCSA |
| Language of cataloging | en |
| Transcribing agency | |
| Description conventions | rda |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Vacca, John R. |
| 245 01 - TITLE STATEMENT | |
| Title | Computer and Information Security Handbook |
| Statement of responsibility, etc. | ['Vacca, John R.'] |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
| Name of producer, publisher, distributor, manufacturer | Morgan Kaufmann |
| Date of production, publication, distribution, manufacture, or copyright notice | 2017 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | p. |
| 336 ## - CONTENT TYPE | |
| Content type code | txt |
| Source | rdacontent |
| 337 ## - MEDIA TYPE | |
| Media type code | c |
| Source | rdamdedia |
| 338 ## - CARRIER TYPE | |
| Carrier type code | c |
| Source | rdacarrier |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements. With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries. Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more. Online chapters can also be found on the book companion website: https://www.elsevier.com/books-and-journals/book-companion/9780128038437 - Written by leaders in the field - Comprehensive and up-to-date coverage of the latest security technologies, issues, and best practices - Presents methods for analysis, along with problem-solving techniques for implementing practical solutions |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | |
| 700 0# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Vacca, John R. |
| 856 40 - ELECTRONIC LOCATION AND ACCESS | |
| Access method | Cyberlibris |
| Uniform Resource Identifier | <a href="https://international.scholarvox.com/netsen/book/88972941">https://international.scholarvox.com/netsen/book/88972941</a> |
| Electronic format type | text/html |
| Host name | |
Pas d'exemplaire disponible.




Réseaux sociaux