000 -LEADER |
fixed length control field |
02337nam a22003855i 4500 |
001 - CONTROL NUMBER |
control field |
17854215 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
CITU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240619143416.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
130815s2013 inu 000 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2013948021 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781118697115 (pbk. : alk. paper) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
1118697111 (pbk. : alk. paper) |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
DLC |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
352.379 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Mowbray, Thomas J. |
Relator term |
author |
245 10 - TITLE STATEMENT |
Title |
Cybersecurity : |
Remainder of title |
managing systems, conducting testing, and investigating intrusions / |
Statement of responsibility, etc. |
Thomas J Mowbray. |
250 ## - EDITION STATEMENT |
Edition statement |
First edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Indianapolis, IN : |
Name of producer, publisher, distributor, manufacturer |
John Wiley and Sons, |
Date of production, publication, distribution, manufacture, or copyright notice |
[2014]. |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Date of production, publication, distribution, manufacture, or copyright notice |
c2014. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxiv, 336 pages : |
Other physical details |
illustrations ; |
Dimensions |
23 cm. |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Media type code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Carrier type code |
nc |
Source |
rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Introduction xix Part I Cyber Network Security Concepts 1 Chapter 1 Executive Summary 3 Chapter 2 The Problems: Cyber Antipatterns 15 Chapter 3 Enterprise Security Using the Zachman Framework 37 Part II Cyber Network Security Hands-On 59 Chapter 4 Network Administration for Security Professionals 61 Chapter 5 Customizing BackTrack and Security Tools 103 Chapter 6 Protocol Analysis and Network Programming 115 Chapter 7 Reconnaissance, Vulnerability Assessment, and Cyber Testing 139 Chapter 8 Penetration Testing 165 Chapter 9 Cyber Network Defense Using Advanced Log Analysis 189 Part III Cyber Network Application Domains 217 Chapter 10 Cybersecurity for End Users, Social Media, and Virtual Worlds 219 Chapter 11 Cybersecurity Essentials for Small Business 233 Chapter 12 Large Enterprise Cybersecurity: Data Centers and Clouds 241 Chapter 13 Healthcare Information Technology Security 269 Chapter 14 Cyber Warfare: An Architecture for Deterrence 277 Glossary 307 Bibliography 317 Index 323 |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer crimes |
General subdivision |
Prevention. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Information technology |
General subdivision |
Security measures. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Penetration testing (Computer security). |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
0 |
b |
ibc |
c |
orignew |
d |
2 |
e |
epcn |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
BOOK |
Classification part |
352.379 |
Call number prefix |
Subj Ref |
Koha issues (borrowed), all copies |
1 |