Cargando…

Computer security handbook /

Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about h...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Bosworth, Seymour (Editor ), Kabay, Michel E. (Editor ), Whyne, Eric, 1981- (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, New Jersey : Wiley, [2014]
Edición:Sixth edition.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_ocn862041532
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 131031s2014 nju ob 001 0 eng
010 |a  2013043853 
040 |a DLC  |b eng  |e rda  |e pn  |c DLC  |d YDX  |d N$T  |d OCLCO  |d YDXCP  |d OCLCO  |d CDX  |d B24X7  |d COO  |d OCLCF  |d OCLCQ  |d OCLCO  |d E7B  |d EBLCP  |d TEFOD  |d AU@  |d DEBSZ  |d DG1  |d TEFOD  |d OCLCQ  |d DEBBG  |d DG1  |d COCUF  |d CNNOR  |d LIP  |d ZCU  |d LIV  |d MERUC  |d OCLCQ  |d U3W  |d UCO  |d OCLCQ  |d STF  |d ICG  |d NRAMU  |d INT  |d OCLCQ  |d WYU  |d UWO  |d G3B  |d VT2  |d OCLCQ  |d A6Q  |d DKC  |d OCLCQ  |d AZK  |d CRU  |d UX1  |d ADU  |d UKAHL  |d OCLCQ  |d BRF  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 874322357  |a 880758875  |a 889313753  |a 961588893  |a 974979085  |a 975031940  |a 981863775  |a 992907272  |a 1005947002  |a 1018017280  |a 1037750015  |a 1043633405  |a 1055365061  |a 1069649890  |a 1081266166  |a 1083552890  |a 1100568272  |a 1101715072  |a 1112875897  |a 1119031673  |a 1136537083  |a 1225270012  |a 1228618292  |a 1257378113 
020 |a 9781118851791  |q (electronic bk.) 
020 |a 111885179X  |q (electronic bk.) 
020 |a 9781118851746  |q (electronic bk.) 
020 |a 1118851749  |q (electronic bk.) 
020 |a 9781118851678  |q (electronic bk.) 
020 |a 1118851676  |q (electronic bk.) 
020 |z 1118134109  |q (vol. 1 ;  |q pbk.) 
020 |z 9781118134108  |q (vol. 1 ;  |q pbk.) 
020 |z 1118134117  |q (vol. 2 ;  |q pbk.) 
020 |z 9781118134115  |q (vol. 2 ;  |q pbk.) 
020 |z 1118127064  |q (2 volume set ;  |q pbk.) 
020 |z 9781118127063  |q (2 volume set ;  |q pbk.) 
020 |z 9781118851722  |q (pdf) 
020 |z 1118851722  |q (pdf) 
029 1 |a AU@  |b 000052169937 
029 1 |a AU@  |b 000052901623 
029 1 |a AU@  |b 000053310544 
029 1 |a CHNEW  |b 000942486 
029 1 |a CHVBK  |b 480227756 
029 1 |a DEBBG  |b BV043396316 
029 1 |a DEBBG  |b BV044067374 
029 1 |a DEBSZ  |b 431653348 
029 1 |a DEBSZ  |b 468874127 
029 1 |a GBVCP  |b 780908694 
035 |a (OCoLC)862041532  |z (OCoLC)874322357  |z (OCoLC)880758875  |z (OCoLC)889313753  |z (OCoLC)961588893  |z (OCoLC)974979085  |z (OCoLC)975031940  |z (OCoLC)981863775  |z (OCoLC)992907272  |z (OCoLC)1005947002  |z (OCoLC)1018017280  |z (OCoLC)1037750015  |z (OCoLC)1043633405  |z (OCoLC)1055365061  |z (OCoLC)1069649890  |z (OCoLC)1081266166  |z (OCoLC)1083552890  |z (OCoLC)1100568272  |z (OCoLC)1101715072  |z (OCoLC)1112875897  |z (OCoLC)1119031673  |z (OCoLC)1136537083  |z (OCoLC)1225270012  |z (OCoLC)1228618292  |z (OCoLC)1257378113 
037 |a 88D4DA59-9CCD-4F5D-8A15-814529620F68  |b OverDrive, Inc.  |n http://www.overdrive.com 
042 |a pcc 
050 4 |a HF5548.37  |b .C64 2014 
072 7 |a BUS  |x 082000  |2 bisacsh 
072 7 |a BUS  |x 041000  |2 bisacsh 
072 7 |a BUS  |x 042000  |2 bisacsh 
072 7 |a BUS  |x 085000  |2 bisacsh 
082 0 4 |a 658.4/78  |2 23 
049 |a UAMI 
245 0 0 |a Computer security handbook /  |c edited by Seymour Bosworth, Michel E. Kabay, Eric Whyne. 
250 |a Sixth edition. 
264 1 |a Hoboken, New Jersey :  |b Wiley,  |c [2014] 
300 |a 1 online resource (2 volumes) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
588 0 |a Online resource; title from digital title page (viewed on April 24, 2014). 
505 0 |a COMPUTER SECURITY HANDBOOK (Volume 1); CONTENTS; PREFACE; ACKNOWLEDGMENTS; ABOUT THE EDITORS; ABOUT THE CONTRIBUTORS; A NOTE TO THE INSTRUCTOR; INTRODUCTION TO PART I: FOUNDATIONS OF COMPUTER SECURITY; CHAPTER 1 BRIEF HISTORY AND MISSION OF INFORMATION SYSTEM SECURITY; 1.1 INTRODUCTION TO INFORMATION SYSTEM SECURITY; 1.2 EVOLUTION OF INFORMATION SYSTEMS; 1.2.1 1950s: Punched-Card Systems; 1.2.2 Large-Scale Computers; 1.2.3 Medium-Size Computers; 1.2.4 1960s: Small-Scale Computers; 1.2.5 Transistors and Core Memory; 1.2.6 Time Sharing; 1.2.7 Real-Time, Online Systems. 
505 8 |a 1.2.8 A Family of Computers1.2.9 1970s: Microprocessors; 1.2.10 The First Personal Computers; 1.2.11 The First Network; 1.2.12 Further Security Considerations; 1.2.13 The First "Worm"; 1.2.14 1980s: Productivity Enhancements; 1.2.15 1980s: The Personal Computer; 1.2.16 Local Area Networks; 1.2.17 1990s: Interconnection; 1.2.18 1990s: Total Interconnection; 1.2.19 Telecommuting; 1.2.20 Internet and the World Wide Web; 1.2.21 Virtualization and the Cloud; 1.2.22 Supervisory Control and Data Acquisition; 1.3 GOVERNMENT RECOGNITION OF INFORMATION ASSURANCE; 1.3.1 IA Standards. 
505 8 |a 1.3.2 Computers at Risk1.3.3 InfraGard; 1.4 RECENT DEVELOPMENTS; 1.5 ONGOING MISSION FOR INFORMATION SYSTEM SECURITY; 1.6 NOTES; CHAPTER 2 HISTORY OF COMPUTER CRIME; 2.1 WHY STUDY HISTORICAL RECORDS?; 2.2 OVERVIEW; 2.3 1960S AND 1970S: SABOTAGE; 2.3.1 Direct Damage to Computer Centers; 2.3.2 1970-1972: Albert the Saboteur; 2.4 IMPERSONATION; 2.4.1 1970: Jerry Neal Schneider; 2.4.2 1980-2003: Kevin Mitnick; 2.4.3 Credit Card Fraud; 2.4.4 Identity Theft Rises; 2.5 PHONE PHREAKING; 2.5.1 2600 Hz; 2.5.2 1982-1991: Kevin Poulsen; 2.6 DATA DIDDLING; 2.6.1 Equity Funding Fraud (1964-1973). 
505 8 |a 2.6.2 1994: Vladimir Levin and the Citibank Heist2.7 SALAMI FRAUD; 2.8 LOGIC BOMBS; 2.9 EXTORTION; 2.10 TROJAN HORSES; 2.10.1 1988 Flu-Shot Hoax; 2.10.2 Scrambler, 12-Tricks, and PC Cyborg; 2.10.3 1994: Datacomp Hardware Trojan; 2.10.4 Keylogger Trojans; 2.10.5 Haephrati Trojan; 2.10.6 Hardware Trojans and Information Warfare; 2.11 NOTORIOUS WORMS AND VIRUSES; 2.11.1 1970-1990: Early Malware Outbreaks; 2.11.2 December 1987: Christmas Tree Worm; 2.11.3 November 2, 1988: Morris Worm; 2.11.4 Malware in the 1990s; 2.11.5 March 1999: Melissa; 2.11.6 May 2000: I Love You; 2.11.7 July 2010 Stuxnet. 
505 8 |a 2.12 SPAM 22.12.1 1994: Green Card Lottery Spam; 2.12.2 Spam Goes Global; 2.13 DENIAL OF SERVICE; 2.13.1 1996: Unamailer; 2.13.2 2000: MafiaBoy; 2.14 HACKER UNDERGROUND; 2.14.1 1981: Chaos Computer Club; 2.14.2 1982: The 414s; 2.14.3 1984: Cult of the Dead Cow; 2.14.4 1984: 2600: The Hacker Quarterly; 2.14.5 1984: Legion of Doom; 2.14.6 1985: Phrack; 2.14.7 1989: Masters of Deception; 2.14.8 1990: Operation Sundevil; 2.14.9 1990: Steve Jackson Games; 2.14.10 1992: L0pht Heavy Industries; 2.14.11 2004: Shadowcrew; 2.14.12 Late 2000s: Russian Business Network (RBN); 2.14.13 Anonymous. 
520 |a Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written for professionals and college students, it provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more. This essential and highly-regarded r. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Electronic data processing departments  |x Security measures. 
650 6 |a Centres de traitement de l'information  |x Sécurité  |x Mesures. 
650 7 |a BUSINESS & ECONOMICS  |x Industrial Management.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Management.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Management Science.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Organizational Behavior.  |2 bisacsh 
650 7 |a Electronic data processing departments  |x Security measures  |2 fast 
700 1 |a Bosworth, Seymour,  |e editor. 
700 1 |a Kabay, Michel E.,  |e editor. 
700 1 |a Whyne, Eric,  |d 1981-  |e editor. 
758 |i has work:  |a Computer security handbook (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCG8QCqmF699444r3R9yHkC  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |t Computer security handbook.  |b Sixth edition.  |d Hoboken, New Jersey : John Wiley & Sons, Inc., [2014]  |z 9781118134108  |w (DLC) 2013041083  |w (OCoLC)858361127 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1652940  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26312020 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26312009 
938 |a Books 24x7  |b B247  |n bks00063501 
938 |a Coutts Information Services  |b COUT  |n 27828122 
938 |a EBL - Ebook Library  |b EBLB  |n EBL4039255 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1652940 
938 |a ebrary  |b EBRY  |n ebr10851665 
938 |a EBSCOhost  |b EBSC  |n 719550 
938 |a YBP Library Services  |b YANK  |n 11715768 
938 |a YBP Library Services  |b YANK  |n 12677512 
938 |a YBP Library Services  |b YANK  |n 15281292 
994 |a 92  |b IZTAP