| 000 -LEADER |
| fixed length control field |
03345nam a22004217a 4500 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
CITU |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20220809110614.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
101222s2011 nyua fb 001 0 eng |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9780071836555 |
| 041 ## - LANGUAGE CODE |
| Language code of text/sound track or separate title |
eng |
| 042 ## - AUTHENTICATION CODE |
| Authentication code |
pcc |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
QA76.9.A25 |
| Item number |
C6555 2015 |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Edition number |
22 |
| 084 ## - OTHER CLASSIFICATION NUMBER |
| Classification number |
COM055000 |
| Source of number |
bisacsh |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Preferred name for the person |
Nestler, Vincent J. |
| Relator term |
author |
| 245 00 - TITLE STATEMENT |
| Title |
Principles of computer security : |
| Remainder of title |
lab manual / |
| Statement of responsibility, etc |
Vincent Nestler, Keith Harrison, Matthew Hirsch, Wm. Art Conklin. |
| 250 ## - EDITION STATEMENT |
| Edition statement |
Fourth edition |
| 264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc |
New York : |
| Name of publisher, distributor, etc |
McGraw-Hill Education , |
| Date of publication, distribution, etc |
[2015] |
| 264 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Date of publication, distribution, etc |
c2015 |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xxiii, 360 pages. : |
| Dimensions |
28 cm. |
| 336 ## - CONTENT TYPE |
| Source |
rdacontent |
| Content type term |
text |
| Content type code |
txt |
| 337 ## - MEDIA TYPE |
| Source |
rdamedia |
| Media type term |
unmediated |
| Media type code |
n |
| 338 ## - CARRIER TYPE |
| Source |
rdacarrier |
| Carrier type term |
volume |
| Carrier type code |
nc |
| 500 ## - GENERAL NOTE |
| General note |
Rev. ed. of: Computer security lab manual. c2006. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc |
Includes bibliographical references and index. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc |
"Written by leading IT security educators, this fully updated lab manual supplements Principles of Computer Security: CompTIA Security+ and Beyond, second edition. Principles of Computer Security Lab Manual, second edition, contains more than 30 labs that challenge you to solve real-world problems with key concepts. Clear, measurable lab objectives map to CompTIA Security+ certification exam objectives, ensuring clear correspondence to Principles of Computer Security: CompTIA Security+ and Beyond, Second Edition.The Lab Manual also includes materials lists and lab set-up instructions. Step-by-step, not click-by click, lab scenarios require you to think critically, and Hint and Warning icons aid you through potentially tricky situations. Post-lab observation questions measure your understanding of lab results and the key term quiz helps to build vocabulary. Principles of Computer Security Lab Manual, second edition, features: new, more dynamic design and a larger trim size, the real-world, hands-on practice you need to pass the certification exam and succeed on the job Lab solutions on the textbook OLC (Online Learning Center). All-inclusive coverage: Introduction and Security Trends; General Security Concepts; Operational/Organizational Security; The Role of People in Security; Cryptography; Public Key Infrastructure; Standards and Protocols; Physical Security; Network Fundamentals; Infrastructure Security; Authentication and Remote Access; Wireless Security; Intrusion Detection Systems and Network Security; Baselines; Types of Attacks and Malicious Software; E-mail and Instant Messaging; Web Components; Secure Software Development; Disaster Recovery, Business Continuity, and Organizational Policies; Risk Management; Change Management; Privilege Management; Computer Forensics; Legal Issues and Ethics; Privacy"-- |
| Assigning source |
Provided by publisher. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security |
| General subdivision |
Management |
| Form subdivision |
Handbooks, manuals, etc. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Data protection |
| Form subdivision |
Handbooks, manuals, etc. |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
COMPUTERS / Certification Guides / General |
| Source of heading or term |
bisacsh. |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Harrison, Keith |
| Relator term |
author |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Hirsch, Matthew |
| Relator term |
author |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Conklin, Wm. Art |
| Relator term |
author |
| 730 0# - ADDED ENTRY--UNIFORM TITLE |
| Uniform title |
Computer security lab manual. |
| 906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
| a |
7 |
| b |
cbc |
| c |
orignew |
| d |
1 |
| e |
ecip |
| f |
20 |
| g |
y-gencatlg |
| 942 ## - ADDED ENTRY ELEMENTS |
| Source of classification or shelving scheme |
|
| Item type |
BOOK |