Analyzing Computer Security : A Threat / Vulnerability / Countermeasure Approach (Record no. 3372)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02176nam a2200289Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | RRU |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20230215223213.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 210901b ||||||||| ||||||| 0|eng|d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9789332517424 |
Printed Price | Rs.725.00 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | RRU |
Language of cataloging | English |
041 ## - LANGUAGE CODE | |
Language code of text/sound track or separate title | Eng. |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Class No. | 005.8 |
Item number | PFL |
100 ## - FIRST AUTHOR (IF A PERSON) | |
9 (RLIN) | 1703 |
Name of author | Pfleeger, Charles P |
245 #0 - TITLE STATEMENT | |
Title | Analyzing Computer Security : A Threat / Vulnerability / Countermeasure Approach |
Statement of responsibility | Charles P. Pfleeger |
250 ## - EDITION STATEMENT | |
Edition statement | 1st Ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Name of publisher, distributor, etc. | Pearson |
Place of publication, distribution, etc. | New Delhi |
Date of publication, distribution, etc. | 2014 |
300 ## - PHYSICAL DESCRIPTION | |
No. of pages | 795p. |
Other physical details | 20.3 x 25.4 x 4.7 cm |
520 ## - SUMMARY, ETC. | |
Summary, etc. | In this book, the authors of the 20-year best-selling classic Security in Computing take a fresh, contemporary and powerfully relevant new approach to introducing computer security. Organized around attacks and mitigations, the Pfleegers' new Analyzing Computer Security will attract students attention by building on the high-profile security failures they may have already encountered in the popular media. Each section starts with an attack description. Next, the authors explain the vulnerabilities that have allowed this attack to occur. With this foundation in place, they systematically present today's most effective countermeasures for blocking or weakening the attack. One step at a time, students progress from attack/problem/harm to solution/protection/mitigation, building the powerful real-world problem solving skills they need to succeed as information security professionals. Analyzing Computer Security addresses crucial contemporary computer security themes throughout, including effective security management and risk analysis economics and quantitative study privacy, ethics and laws and the use of overlapping controls. The authors also present significant new material on computer forensics, insiders, human factors and trust. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Subject heading | Computer security |
9 (RLIN) | 1346 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Subject heading | Data protection |
9 (RLIN) | 1704 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Subject heading | Information technology--Security measures |
9 (RLIN) | 1705 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Subject heading | Computer networks--Security measures |
9 (RLIN) | 1267 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Subject heading | Computers--Access control |
9 (RLIN) | 1582 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Subject heading | Computer security--Management |
9 (RLIN) | 1863 |
700 ## - ADDITIONAL AUTHOR (INDIVIDUAL) | |
9 (RLIN) | 1864 |
Author name | Pfleeger, Shari Lawrence |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan (e.g. reference copy) | Home library | Current library | Date acquired | Inventory number | Total Checkouts | Full call number | Accession No | Date last seen | Item MRP (printed price) | Price effective from | Koha item type | Date last checked out |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Rashtriya Raksha University | Rashtriya Raksha University | 07/08/2014 | 05292 | 005.8 PFL | 5292 | 02/09/2021 | 725.00 | 02/09/2021 | Books | ||||||
Dewey Decimal Classification | Rashtriya Raksha University | Rashtriya Raksha University | 22/09/2014 | 05357 | 005.8 PFL | 5357 | 02/09/2021 | 725.00 | 02/09/2021 | Books | ||||||
Dewey Decimal Classification | Rashtriya Raksha University | Rashtriya Raksha University | 22/09/2014 | 05358 | 005.8 PFL | 5358 | 02/09/2021 | 725.00 | 02/09/2021 | Books | ||||||
Dewey Decimal Classification | Rashtriya Raksha University | Rashtriya Raksha University | 22/09/2014 | 05359 | 1 | 005.8 PFL | 5359 | 19/10/2024 | 725.00 | 02/09/2021 | Books | 02/10/2024 | ||||
Dewey Decimal Classification | Rashtriya Raksha University | Rashtriya Raksha University | 22/09/2014 | 05360 | 1 | 005.8 PFL | 5360 | 03/02/2023 | 725.00 | 02/09/2021 | Books | 13/01/2023 |