000 -LEADER |
fixed length control field |
04142cam a22004577i 4500 |
001 - CONTROL NUMBER |
control field |
16343933 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20160217140959.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
100722t20102010nyua b 001 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2010933120 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780857290052 (pbk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0857290053 (pbk.) |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)ocn648933511 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
BTCTA |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
BTCTA |
Modifying agency |
YDXCP |
-- |
CDX |
-- |
NJI |
-- |
Z5A |
-- |
TTU |
-- |
YYP |
-- |
MNY |
-- |
WRM |
-- |
COH |
-- |
IOG |
-- |
BDX |
-- |
OBE |
-- |
OCLCF |
-- |
CHVBK |
-- |
DLC |
042 ## - AUTHENTICATION CODE |
Authentication code |
lccopycat |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
Item number |
S2655 2010 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
22 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Salomon, D. |
Fuller form of name |
(David), |
Dates associated with a name |
1938- |
245 10 - TITLE STATEMENT |
Title |
Elements of computer security / |
Statement of responsibility, etc |
David Salomon. |
264 #1 - |
-- |
New York : |
-- |
Springer-Verlag, |
-- |
[2010] |
264 #4 - |
-- |
©2010 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xix, 374 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm. |
336 ## - |
-- |
text |
-- |
txt |
-- |
rdacontent |
337 ## - |
-- |
unmediated |
-- |
n |
-- |
rdamedia |
338 ## - |
-- |
volume |
-- |
nc |
-- |
rdacarrier |
490 1# - SERIES STATEMENT |
Series statement |
Undergraduate topics in computer science |
500 ## - GENERAL NOTE |
General note |
Includes webography. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references (pages 347-361) and index. |
520 ## - SUMMARY, ETC. |
Summary, etc |
Examines the physical security of computer hardware, networks, and digital data. Introduces the different forms of rogue software, discusses methods for preventing and defending against them, and describes a selection of viruses, worms, and Trojans in detail. Investigates threats to network security and explores the subjects of authentication, spyware, and identity theft. Discusses key issues about privacy and trust in the online world.-- |
-- |
From publisher's description. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
1. Physical security. -- Side-channel attacks -- Physical threats -- Laptop security -- Disaster recovery planning -- Privacy protection -- 2. Viruses. -- Operating systems -- Computer viruses -- Virus writers -- Virus propagation -- Virus classification -- Boot sector viruses -- File infector viruses -- Companion viruses -- Multipartite viruses -- Macro and script viruses -- Infected images -- Virus life cycle -- Viruses and UNIX -- Viruses and the Macintosh -- Virus replication -- Virus payload -- Virus organization -- Virus naming -- Virus hiding methods -- Polymorphism -- Virus stealth techniques -- Interrupts and viruses -- Trapdoors -- 3. Worms. -- Code Red I -- Worming techniques -- Proposing a CCDC -- The internet worm -- iPhone worms -- 4. Trojan horses. -- Applications of Trojans -- Installing a Trojan -- Rigging a compiler -- 5. Examples of malware. -- The Lehigh Virus -- The Brain Virus -- The Michaelangelo Virus -- The SirCAM Virus -- The Melissa Virus -- Scores Virus -- Swiss Amiga Virus -- Christmas Card Virus -- VBS.KAK Worm -- The Cruncher Virus -- Opener Virus -- MTX Worm/Virus -- 6. Prevention and defense. -- Understanding vulnerabilities -- Defenses against malware -- Anti-Virus Software -- Backups and such -- Botnets, Zombies, and remote control -- Hoaxes -- 7. Network security. -- Internet vulnerabilities -- Port scanning -- Spoofs -- Spam -- Denial of service -- Firewall basics -- Other threats -- 8. Authentication. -- Local authentication -- Biometric techniques -- Passwords -- 9. Spyware. -- Introduction and definition -- RIAA and Spyware -- Terrorism and Spyware -- Political contributions -- Distributions of Spyware -- Remote reporting -- Adware -- Spyware? -- 10. Identity theft. -- Introduction -- Shredding -- Internet cookies -- Phishing -- The Homograph Threat -- 11. Privacy and trust. -- Privacy issues -- Online privacy -- Children's privacy -- Digital forensics -- Trust -- The Hacker -- 133t Speak -- Virus Timeline. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures. |
Source of heading or term |
fast |
-- |
(OCoLC)fst00872341 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
Source of heading or term |
fast |
-- |
(OCoLC)fst00872484 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computersicherheit. |
Source of heading or term |
idszbz |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Datensicherung. |
Source of heading or term |
idszbz |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Undergraduate topics in computer science. |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
copycat |
d |
2 |
e |
epcn |
f |
20 |
g |
y-gencatlg |
925 0# - |
-- |
Acquire |
-- |
1 shelf copy |
-- |
policy default |