Cybersecurity : (Record no. 49498)

000 -LEADER
fixed length control field 02337nam a22003855i 4500
001 - CONTROL NUMBER
control field 17854215
003 - CONTROL NUMBER IDENTIFIER
control field CITU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240619143416.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 130815s2013 inu 000 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2013948021
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118697115 (pbk. : alk. paper)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1118697111 (pbk. : alk. paper)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions rda
Transcribing agency DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 352.379
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Mowbray, Thomas J.
Relator term author
245 10 - TITLE STATEMENT
Title Cybersecurity :
Remainder of title managing systems, conducting testing, and investigating intrusions /
Statement of responsibility, etc. Thomas J Mowbray.
250 ## - EDITION STATEMENT
Edition statement First edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Indianapolis, IN :
Name of producer, publisher, distributor, manufacturer John Wiley and Sons,
Date of production, publication, distribution, manufacture, or copyright notice [2014].
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice c2014.
300 ## - PHYSICAL DESCRIPTION
Extent xxiv, 336 pages :
Other physical details illustrations ;
Dimensions 23 cm.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Introduction xix Part I Cyber Network Security Concepts 1 Chapter 1 Executive Summary 3 Chapter 2 The Problems: Cyber Antipatterns 15 Chapter 3 Enterprise Security Using the Zachman Framework 37 Part II Cyber Network Security Hands-On 59 Chapter 4 Network Administration for Security Professionals 61 Chapter 5 Customizing BackTrack and Security Tools 103 Chapter 6 Protocol Analysis and Network Programming 115 Chapter 7 Reconnaissance, Vulnerability Assessment, and Cyber Testing 139 Chapter 8 Penetration Testing 165 Chapter 9 Cyber Network Defense Using Advanced Log Analysis 189 Part III Cyber Network Application Domains 217 Chapter 10 Cybersecurity for End Users, Social Media, and Virtual Worlds 219 Chapter 11 Cybersecurity Essentials for Small Business 233 Chapter 12 Large Enterprise Cybersecurity: Data Centers and Clouds 241 Chapter 13 Healthcare Information Technology Security 269 Chapter 14 Cyber Warfare: An Architecture for Deterrence 277 Glossary 307 Bibliography 317 Index 323
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes
General subdivision Prevention.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information technology
General subdivision Security measures.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Penetration testing (Computer security).
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 0
b ibc
c orignew
d 2
e epcn
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type BOOK
Classification part 352.379
Call number prefix Subj Ref
Koha issues (borrowed), all copies 1
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Source of acquisition Cost, normal purchase price Inventory number Total Checkouts Full call number Barcode Date last seen Date last checked out Price effective from Koha item type
          COLLEGE LIBRARY COLLEGE LIBRARY SUBJECT REFERENCE 2014-09-10 ALBASA 4616.00 45949 1 352.379 M871 2014 CITU-CL-45949 2024-06-27 2024-06-19 2020-09-12 BOOK