Elements of computer security / (Record no. 56102)

000 -LEADER
fixed length control field 04142cam a22004577i 4500
001 - CONTROL NUMBER
control field 16343933
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20160217140959.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100722t20102010nyua b 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2010933120
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780857290052 (pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0857290053 (pbk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn648933511
040 ## - CATALOGING SOURCE
Original cataloging agency BTCTA
Language of cataloging eng
Description conventions rda
Transcribing agency BTCTA
Modifying agency YDXCP
-- CDX
-- NJI
-- Z5A
-- TTU
-- YYP
-- MNY
-- WRM
-- COH
-- IOG
-- BDX
-- OBE
-- OCLCF
-- CHVBK
-- DLC
042 ## - AUTHENTICATION CODE
Authentication code lccopycat
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number S2655 2010
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Salomon, D.
Fuller form of name (David),
Dates associated with a name 1938-
245 10 - TITLE STATEMENT
Title Elements of computer security /
Statement of responsibility, etc David Salomon.
264 #1 -
-- New York :
-- Springer-Verlag,
-- [2010]
264 #4 -
-- ©2010
300 ## - PHYSICAL DESCRIPTION
Extent xix, 374 pages :
Other physical details illustrations ;
Dimensions 24 cm.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- unmediated
-- n
-- rdamedia
338 ## -
-- volume
-- nc
-- rdacarrier
490 1# - SERIES STATEMENT
Series statement Undergraduate topics in computer science
500 ## - GENERAL NOTE
General note Includes webography.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references (pages 347-361) and index.
520 ## - SUMMARY, ETC.
Summary, etc Examines the physical security of computer hardware, networks, and digital data. Introduces the different forms of rogue software, discusses methods for preventing and defending against them, and describes a selection of viruses, worms, and Trojans in detail. Investigates threats to network security and explores the subjects of authentication, spyware, and identity theft. Discusses key issues about privacy and trust in the online world.--
-- From publisher's description.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Physical security. -- Side-channel attacks -- Physical threats -- Laptop security -- Disaster recovery planning -- Privacy protection -- 2. Viruses. -- Operating systems -- Computer viruses -- Virus writers -- Virus propagation -- Virus classification -- Boot sector viruses -- File infector viruses -- Companion viruses -- Multipartite viruses -- Macro and script viruses -- Infected images -- Virus life cycle -- Viruses and UNIX -- Viruses and the Macintosh -- Virus replication -- Virus payload -- Virus organization -- Virus naming -- Virus hiding methods -- Polymorphism -- Virus stealth techniques -- Interrupts and viruses -- Trapdoors -- 3. Worms. -- Code Red I -- Worming techniques -- Proposing a CCDC -- The internet worm -- iPhone worms -- 4. Trojan horses. -- Applications of Trojans -- Installing a Trojan -- Rigging a compiler -- 5. Examples of malware. -- The Lehigh Virus -- The Brain Virus -- The Michaelangelo Virus -- The SirCAM Virus -- The Melissa Virus -- Scores Virus -- Swiss Amiga Virus -- Christmas Card Virus -- VBS.KAK Worm -- The Cruncher Virus -- Opener Virus -- MTX Worm/Virus -- 6. Prevention and defense. -- Understanding vulnerabilities -- Defenses against malware -- Anti-Virus Software -- Backups and such -- Botnets, Zombies, and remote control -- Hoaxes -- 7. Network security. -- Internet vulnerabilities -- Port scanning -- Spoofs -- Spam -- Denial of service -- Firewall basics -- Other threats -- 8. Authentication. -- Local authentication -- Biometric techniques -- Passwords -- 9. Spyware. -- Introduction and definition -- RIAA and Spyware -- Terrorism and Spyware -- Political contributions -- Distributions of Spyware -- Remote reporting -- Adware -- Spyware? -- 10. Identity theft. -- Introduction -- Shredding -- Internet cookies -- Phishing -- The Homograph Threat -- 11. Privacy and trust. -- Privacy issues -- Online privacy -- Children's privacy -- Digital forensics -- Trust -- The Hacker -- 133t Speak -- Virus Timeline.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
Source of heading or term fast
-- (OCoLC)fst00872341
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
Source of heading or term fast
-- (OCoLC)fst00872484
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computersicherheit.
Source of heading or term idszbz
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Datensicherung.
Source of heading or term idszbz
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Undergraduate topics in computer science.
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c copycat
d 2
e epcn
f 20
g y-gencatlg
925 0# -
-- Acquire
-- 1 shelf copy
-- policy default
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Date acquired Full call number Barcode Date last seen Price effective from
          University of Sargodha-Central Library University of Sargodha-Central Library 02/17/2016 005.8 SAE 93638 02/17/2016 02/17/2016