Principles of computer security : (Record no. 1968)

MARC details
000 -LEADER
fixed length control field 03081cam a22003735i 4500
003 - CONTROL NUMBER IDENTIFIER
control field EG-CaNGU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240131121910.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 231101t2022 nyua frb 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781260474312
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1260474313
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions rda
Transcribing agency DLC
Modifying agency EG-CaNGU
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8076
Item number COP
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Conklin, Wm. Arthur,
Fuller form of name (William Arthur),
Relator term author.
9 (RLIN) 5837
245 10 - TITLE STATEMENT
Title Principles of computer security :
Remainder of title CompTIA security+ and beyond, (Exam SY0-601) /
250 ## - EDITION STATEMENT
Edition statement Sixth Edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture New York :
Name of producer, publisher, distributor, manufacturer McGraw Hill,
Date of production, publication, distribution, manufacture, or copyright notice [2022]
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice ©2022
300 ## - PHYSICAL DESCRIPTION
Extent xxxiii, 1038 pages :
Other physical details illustrations ;
Dimensions 28 cm
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
500 ## - GENERAL NOTE
General note Includes glossary.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 00 - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1: Introduction and Security Trends -- Chapter 2: General Security Concepts -- Chapter 3: Operational and Organizational Security -- Chapter 4: The Role of People in Security -- Chapter 5: Cryptography -- Chapter 6: Applied Cryptography -- Chapter 7: Public Key Infrastructure -- Chapter 8 Physical Security -- Chapter 9: Network Fundamentals -- Chapter 10: Infrastructure Security -- Chapter 11: Authentication and Remote Access -- Chapter 12: Wireless Security and Mobile Devices -- Chapter 13: Intrusion Detection Systems and Network Security -- Chapter 14: System Hardening and Baselines -- Chapter 15: Types of Attacks and Malicious Software -- Chapter 16: Security Tools and Techniques -- Chapter 17: Web Components, E-mail, and Instant Messaging -- Chapter 18: Cloud Computing -- Chapter 19: Secure Software Development -- Chapter 20: Risk Management -- Chapter 21: Business Continuity, Disaster Recovery, and Change Management -- Chapter 22: Incident Response -- Chapter 23: Computer Forensics -- Chapter 24: Legal Issues and Ethics -- Chapter 25: Privacy -- Glossary -- Index.<br/><br/>
520 ## - SUMMARY, ETC.
Summary, etc. "Learn IT security fundamentals while getting complete coverage of the objectives for the latest release of CompTIA Security+ certification exam SY0-601. This thoroughly revised, full-color textbook discusses communication, infrastructure, operational security, attack prevention, disaster recovery, computer forensics, and much more. Written by a team of highly respected security educators, Principles of Computer Security: CompTIA Security+ and Beyond, Sixth Edition (Exam SY0-601) will help you pass the exam and become a CompTIA certified computer security expert"--
Assigning source Provided by publisher.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
Source of heading or term NGU-sh
9 (RLIN) 5838
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision security measures.
Source of heading or term NGU-sh
9 (RLIN) 5839
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Examinations.
Source of term NGU-sh
9 (RLIN) 5726
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name White, Gregory B.,
Relator term author.
9 (RLIN) 5840
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Cothren, Chuck,
Relator term author.
9 (RLIN) 5841
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Davis, Roger,
Titles and other words associated with a name (Security expert),
Relator term author.
9 (RLIN) 5842
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Williams, Dwayne,
Relator term author.
9 (RLIN) 5843
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Date acquired Source of acquisition Cost, normal purchase price Arrivals Code Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification   Not For Loan Information Technology Library D Library D 11/01/2023 Baccah 2182.00 ITS202311 005.8076 COP 1004518 08/14/2024 11/01/2023 Book Non-borrowing
    Dewey Decimal Classification     Information Technology Library D Library D 11/01/2023 Baccah 2182.00 ITS202311 005.8076 COP 1004519 08/14/2024 11/01/2023 Book