MARC details
| 000 -LEADER |
| fixed length control field |
05945cam a2200409 i 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20250918234657.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
140523s2013 flua b 001 0 eng |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781466501331 (alk. paper) |
| Terms of availability |
RM273.13 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
1466501332 (alk. paper) |
| 039 #9 - LEVEL OF BIBLIOGRAPHIC CONTROL AND CODING DETAIL [OBSOLETE] |
| Level of rules in bibliographic description |
201411121445 |
| Level of effort used to assign nonsubject heading access points |
adnan |
| Level of effort used to assign subject headings |
201411030920 |
| Level of effort used to assign classification |
masrul |
| y |
05-23-2014 |
| z |
masrul |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
AU@ |
| Language of cataloging |
eng |
| Transcribing agency |
AU@ |
| Modifying agency |
DLC |
| -- |
BTCTA |
| -- |
UKMGB |
| -- |
YDXCP |
| -- |
BWX |
| -- |
CDX |
| -- |
UBY |
| -- |
JHE |
| -- |
UKM |
| Description conventions |
rda |
| 090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN) |
| Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) |
C18.K645 2 |
| 090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN) |
| Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) |
C18 |
| Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) |
.K645 2 |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Kostopoulos, George K., |
| Dates associated with a name |
1939-, |
| Relator term |
author. |
| 245 10 - TITLE STATEMENT |
| Title |
Cyberspace and cybersecurity / |
| Statement of responsibility, etc. |
George K. Kostopoulos. |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Place of production, publication, distribution, manufacture |
Boca Raton, Fl. : |
| Name of producer, publisher, distributor, manufacturer |
CRC Press, |
| Date of production, publication, distribution, manufacture, or copyright notice |
[2013] |
| 264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Date of production, publication, distribution, manufacture, or copyright notice |
©2013 |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xvii, 218 pages : |
| Other physical details |
illustrations ; |
| Dimensions |
24 cm. |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Source |
rdacontent |
| 337 ## - MEDIA TYPE |
| Media type term |
unmediated |
| Source |
rdamedia |
| 338 ## - CARRIER TYPE |
| Carrier type term |
volume |
| Source |
rdacarrier |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc. note |
Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Machine generated contents note: 1.Vulnerabilities in Information Systems -- Introduction -- Measuring Vulnerability -- Avoiding Vulnerabilities through Secure Coding -- Mistakes Can Be Good -- Threats Classification -- Threat Modeling Process -- Security Starts at Home -- Security in Applications -- International Awareness -- Exercises -- 2.Vulnerabilities in the Organization -- Introduction -- Common Organizational Vulnerabilities -- Access Authorization and Authentication -- Human Factors -- Security Services -- External Technologies -- Wireless Networks -- Bluetooth -- Passive Vulnerabilities -- Active Vulnerabilities -- Precautions -- Wireless Fidelity -- Wi-Fi Precautions at Home -- Wi-Fi Precautions at the Hotspot -- Wi-Fi Precautions at the Enterprise -- Worldwide Interoperability Microwave Access -- WiMAX Features -- Cloud Computing -- Exercises -- 3.Risks in Information Systems Infrastructure -- Introduction -- Risks in Hardware -- Risks in Software -- |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Note continued: Risks in People -- Risks in Laptops -- Risks in Cyberspace -- Risk Insurance in Cyberspace -- Exercises -- 4.Secure Information Systems -- Introduction -- Assets Identification -- Assets Communication -- Assets Storage -- Resource Access Control Facility -- Securing the Email Communications -- Email Server Side -- Email Client Side -- Information Security Management -- Exercises -- 5.Cybersecurity and the CIO -- Introduction -- CIO: Personality -- Trust and Ethics -- Communication and Intelligence -- Leadership and Entrepreneurship -- Courage and Limitations -- CIO: Education -- University Degrees -- Certifications -- CIO: Experience -- CIO: Responsibilities -- Data Backup and Archiving -- Culture of Security -- Cyber Training -- Contingency Plans -- Liability -- CIO: Information Security -- Internal Information Security Components -- Access Control -- Electronic -- Access Control -- Physical -- Cyber Policies -- Cyber Awareness and Training -- Training -- |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Note continued: Business Continuity -- CIO: The Changing Role -- Exercises -- 6.Building a Secure Organization -- Introduction -- Business Continuity Planning -- Business Impact Analysis (BIA) -- Business Recovery Strategy (BRS) -- Drafting of the BCP -- Testing of the BCP -- Training in BCP Implementation -- BCP Performance Indicators -- System Access Control -- System Development and Maintenance -- Physical and Environmental Security -- Compliance -- Personnel Security -- Security Organization -- Computer and Network Management -- Asset Classification and Control -- Security Policy -- Exercises -- 7.Cyberspace Intrusions -- Introduction -- IDPS Configuration -- Sensors -- Processor -- Consoles -- Network -- IDPS Capabilities -- Information Acquisition -- Information Loggings -- Detection Techniques -- Prevention Actions -- IDPS Management -- Implementation -- Step One Features -- Step Two Architecture -- Step Three Installation -- Step Four Testing -- |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Note continued: Step Five Activation -- Operation -- Maintenance -- IDPS Classification -- Host-Based IDPS -- Network-Based IDPS -- Network Behavior Analysis System -- Wireless IDPS -- IDPS Comparison -- Exercises -- 8.Cyberspace Defense -- Introduction -- File Protection Applications -- File Backup -- Disaster Recovery -- History Deletion -- Shredding and Wiping -- File Undelete -- File Encryption -- Loggers -- Anti-Loggers -- PC Performance Applications -- Registry Repair -- Anti-Rootkits -- Antivirus -- Junk Files -- Fragmentation -- Protection Tools -- Security Analyzer -- Password Analyzer -- Firewalls -- Packet-Level Filtering -- Circuit-Level Filtering -- Application-Level Gateway -- Email Protection -- Exercises -- 9.Cyberspace and the Law -- Introduction -- International Laws -- Europe -- United Nations -- North Atlantic Treaty Organization -- INTERPOL -- Impediments to Cyber Law Enforcement -- Cyber-Related Laws in the United States -- |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Note continued: Commercial Privacy Bill of Rights Act of 2011 -- Cybersecurity Act of 2010 -- Federal Information Security Management Act of 2002 -- USA PATRIOT Act of 2001 -- Communications Assistance for Law Enforcement Act of 1994 -- Computer Security Act of 1987 -- Privacy Act of 1974 -- Cybercrime -- Trends in Cyber Abuse -- Combating Cybercrime -- Exercises -- 10.Cyber Warfare and Homeland Security -- Introduction -- Cyber Warfare -- Cyber Weapons Convention -- Cyber Terrorism -- Cyber Espionage -- Homeland Security -- National Cyber Security Division -- Cybersecurity Preparedness -- Challenges -- Distributed Defense -- Countermeasures -- Cyber Defense Ecosystem -- Cybersecurity Training -- Cyber Simulation and Exercises -- Exercises. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer security. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Cyberspace |
| General subdivision |
Security measures. |
| 907 ## - LOCAL DATA ELEMENT G, LDG (RLIN) |
| a |
.b15907740 |
| b |
2019-11-12 |
| c |
2019-11-12 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Koha item type |
AM |
| Suppress in OPAC |
No |
| Call number prefix |
C18.K645 2 |
| 914 ## - VTLS Number |
| VTLS Number |
vtls003560158 |
| 990 ## - EQUIVALENCES OR CROSS-REFERENCES [LOCAL, CANADA] |
| Link information for 9XX fields |
mab |
| 991 ## - LOCAL NOTE (NAMA FAKULTI/INSTITUT/PUSAT) |
| a |
Fakulti Undang-Undang |
| 998 ## - LOCAL CONTROL INFORMATION (RLIN) |
| Library |
PERPUSTAKAAN UNDANG-UNDANG |
| Operator's initials, OID (RLIN) |
2014-10-05 |
| Cataloger's initials, CIN (RLIN) |
m |
| Material Type (Sierra) |
Printed Books |
| Language |
English |
| Country |
|
| -- |
0 |
| -- |
.b15907740 |