|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBSCO_ocn868963214 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
140915s2013 nyua ob 001 0 eng |
010 |
|
|
|a 2019714037
|
040 |
|
|
|a DLC
|b eng
|e rda
|e pn
|c DLC
|d YDXCP
|d N$T
|d OCLCF
|d EBLCP
|d DEBSZ
|d AGLDB
|d VTS
|d AU@
|d STF
|d M8D
|d E7B
|d OCLCO
|d AJS
|d OCLCO
|d OCLCQ
|d OCLCO
|
016 |
7 |
|
|a 016585459
|2 Uk
|
019 |
|
|
|a 923670904
|
020 |
|
|
|a 9781629481920
|q (ebook)
|
020 |
|
|
|a 1629481920
|
020 |
|
|
|z 1629481912
|
020 |
|
|
|z 9781629481913
|
029 |
1 |
|
|a AU@
|b 000052839721
|
029 |
1 |
|
|a CHBIS
|b 010091040
|
029 |
1 |
|
|a CHNEW
|b 000635668
|
029 |
1 |
|
|a CHVBK
|b 328009253
|
029 |
1 |
|
|a DEBBG
|b BV041638117
|
029 |
1 |
|
|a DEBBG
|b BV043779996
|
029 |
1 |
|
|a DEBSZ
|b 449550990
|
029 |
1 |
|
|a DEBSZ
|b 450745716
|
029 |
1 |
|
|a DEBSZ
|b 454919700
|
035 |
|
|
|a (OCoLC)868963214
|z (OCoLC)923670904
|
050 |
0 |
0 |
|a QA76.9.A25
|
072 |
|
7 |
|a PHI
|x 005000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Malware and computer security incidents :
|b handling guides /
|c Mark Borrelli, editor.
|
264 |
|
1 |
|a New York :
|b Nova Publishers,
|c [2013]
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Computer science, technology and applications
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a MALWARE AND COMPUTER SECURITY INCIDENTS: HANDLING GUIDES; MALWARE AND COMPUTER SECURITY INCIDENTS: HANDLING GUIDES; Library of Congress Cataloging-in-Publication Data; CONTENTS; PREFACE; Chapter 1: GUIDE TO MALWARE INCIDENT PREVENTION AND HANDLING FOR DESKTOPS AND LAPTOPS; SUMMARY; EXECUTIVE SUMMARY; 1. INTRODUCTION; 2. UNDERSTANDING MALWARE THREATS; 3. MALWARE INCIDENT PREVENTION; 4. MALWARE INCIDENT RESPONSE; APPENDIX A-GLOSSARY; APPENDIX B-ACRONYMS AND ABBREVIATIONS; APPENDIX C-RESOURCES; Chapter 2: COMPUTER SECURITY INCIDENT HANDLING GUIDE; ABSTRACT; EXECUTIVE SUMMARY; 1. INTRODUCTION.
|
505 |
8 |
|
|a 2. ORGANIZING A COMPUTER SECURITY INCIDENT RESPONSE CAPABILITY3. HANDLING AN INCIDENT; 4. COORDINATION AND INFORMATION SHARING; APPENDIX A-INCIDENT HANDLING SCENARIOS; APPENDIX B-INCIDENT-RELATED DATA ELEMENTS; APPENDIX C-GLOSSARY; APPENDIX D-ACRONYMS; APPENDIX E-RESOURCES; APPENDIX F-FREQUENTLY ASKED QUESTIONS; APPENDIX G-CRISIS HANDLING STEPS; APPENDIX H-CHANGE LOG; INDEX.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Malware (Computer software)
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Logiciels malveillants.
|
650 |
|
7 |
|a PHILOSOPHY
|x Ethics & Moral Philosophy.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Malware (Computer software)
|2 fast
|
700 |
1 |
|
|a Borrelli, Mark.
|
776 |
0 |
8 |
|i Print version:
|t Malware and computer security incidents.
|d New York : Nova Publishers, [2013]
|z 1629481912
|w (DLC) 2014412681
|
830 |
|
0 |
|a Computer science, technology and applications.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=650538
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL3023258
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10778801
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 650538
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 11182250
|
994 |
|
|
|a 92
|b IZTAP
|