Cyberspace and cybersecurity / (Record no. 570335)

MARC details
000 -LEADER
fixed length control field 05945cam a2200409 i 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250918234657.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140523s2013 flua b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781466501331 (alk. paper)
Terms of availability RM273.13
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1466501332 (alk. paper)
039 #9 - LEVEL OF BIBLIOGRAPHIC CONTROL AND CODING DETAIL [OBSOLETE]
Level of rules in bibliographic description 201411121445
Level of effort used to assign nonsubject heading access points adnan
Level of effort used to assign subject headings 201411030920
Level of effort used to assign classification masrul
y 05-23-2014
z masrul
040 ## - CATALOGING SOURCE
Original cataloging agency AU@
Language of cataloging eng
Transcribing agency AU@
Modifying agency DLC
-- BTCTA
-- UKMGB
-- YDXCP
-- BWX
-- CDX
-- UBY
-- JHE
-- UKM
Description conventions rda
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) C18.K645 2
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) C18
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) .K645 2
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Kostopoulos, George K.,
Dates associated with a name 1939-,
Relator term author.
245 10 - TITLE STATEMENT
Title Cyberspace and cybersecurity /
Statement of responsibility, etc. George K. Kostopoulos.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Boca Raton, Fl. :
Name of producer, publisher, distributor, manufacturer CRC Press,
Date of production, publication, distribution, manufacture, or copyright notice [2013]
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice ©2013
300 ## - PHYSICAL DESCRIPTION
Extent xvii, 218 pages :
Other physical details illustrations ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Machine generated contents note: 1.Vulnerabilities in Information Systems -- Introduction -- Measuring Vulnerability -- Avoiding Vulnerabilities through Secure Coding -- Mistakes Can Be Good -- Threats Classification -- Threat Modeling Process -- Security Starts at Home -- Security in Applications -- International Awareness -- Exercises -- 2.Vulnerabilities in the Organization -- Introduction -- Common Organizational Vulnerabilities -- Access Authorization and Authentication -- Human Factors -- Security Services -- External Technologies -- Wireless Networks -- Bluetooth -- Passive Vulnerabilities -- Active Vulnerabilities -- Precautions -- Wireless Fidelity -- Wi-Fi Precautions at Home -- Wi-Fi Precautions at the Hotspot -- Wi-Fi Precautions at the Enterprise -- Worldwide Interoperability Microwave Access -- WiMAX Features -- Cloud Computing -- Exercises -- 3.Risks in Information Systems Infrastructure -- Introduction -- Risks in Hardware -- Risks in Software --
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Note continued: Risks in People -- Risks in Laptops -- Risks in Cyberspace -- Risk Insurance in Cyberspace -- Exercises -- 4.Secure Information Systems -- Introduction -- Assets Identification -- Assets Communication -- Assets Storage -- Resource Access Control Facility -- Securing the Email Communications -- Email Server Side -- Email Client Side -- Information Security Management -- Exercises -- 5.Cybersecurity and the CIO -- Introduction -- CIO: Personality -- Trust and Ethics -- Communication and Intelligence -- Leadership and Entrepreneurship -- Courage and Limitations -- CIO: Education -- University Degrees -- Certifications -- CIO: Experience -- CIO: Responsibilities -- Data Backup and Archiving -- Culture of Security -- Cyber Training -- Contingency Plans -- Liability -- CIO: Information Security -- Internal Information Security Components -- Access Control -- Electronic -- Access Control -- Physical -- Cyber Policies -- Cyber Awareness and Training -- Training --
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Note continued: Business Continuity -- CIO: The Changing Role -- Exercises -- 6.Building a Secure Organization -- Introduction -- Business Continuity Planning -- Business Impact Analysis (BIA) -- Business Recovery Strategy (BRS) -- Drafting of the BCP -- Testing of the BCP -- Training in BCP Implementation -- BCP Performance Indicators -- System Access Control -- System Development and Maintenance -- Physical and Environmental Security -- Compliance -- Personnel Security -- Security Organization -- Computer and Network Management -- Asset Classification and Control -- Security Policy -- Exercises -- 7.Cyberspace Intrusions -- Introduction -- IDPS Configuration -- Sensors -- Processor -- Consoles -- Network -- IDPS Capabilities -- Information Acquisition -- Information Loggings -- Detection Techniques -- Prevention Actions -- IDPS Management -- Implementation -- Step One Features -- Step Two Architecture -- Step Three Installation -- Step Four Testing --
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Note continued: Step Five Activation -- Operation -- Maintenance -- IDPS Classification -- Host-Based IDPS -- Network-Based IDPS -- Network Behavior Analysis System -- Wireless IDPS -- IDPS Comparison -- Exercises -- 8.Cyberspace Defense -- Introduction -- File Protection Applications -- File Backup -- Disaster Recovery -- History Deletion -- Shredding and Wiping -- File Undelete -- File Encryption -- Loggers -- Anti-Loggers -- PC Performance Applications -- Registry Repair -- Anti-Rootkits -- Antivirus -- Junk Files -- Fragmentation -- Protection Tools -- Security Analyzer -- Password Analyzer -- Firewalls -- Packet-Level Filtering -- Circuit-Level Filtering -- Application-Level Gateway -- Email Protection -- Exercises -- 9.Cyberspace and the Law -- Introduction -- International Laws -- Europe -- United Nations -- North Atlantic Treaty Organization -- INTERPOL -- Impediments to Cyber Law Enforcement -- Cyber-Related Laws in the United States --
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Note continued: Commercial Privacy Bill of Rights Act of 2011 -- Cybersecurity Act of 2010 -- Federal Information Security Management Act of 2002 -- USA PATRIOT Act of 2001 -- Communications Assistance for Law Enforcement Act of 1994 -- Computer Security Act of 1987 -- Privacy Act of 1974 -- Cybercrime -- Trends in Cyber Abuse -- Combating Cybercrime -- Exercises -- 10.Cyber Warfare and Homeland Security -- Introduction -- Cyber Warfare -- Cyber Weapons Convention -- Cyber Terrorism -- Cyber Espionage -- Homeland Security -- National Cyber Security Division -- Cybersecurity Preparedness -- Challenges -- Distributed Defense -- Countermeasures -- Cyber Defense Ecosystem -- Cybersecurity Training -- Cyber Simulation and Exercises -- Exercises.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberspace
General subdivision Security measures.
907 ## - LOCAL DATA ELEMENT G, LDG (RLIN)
a .b15907740
b 2019-11-12
c 2019-11-12
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type AM
Suppress in OPAC No
Call number prefix C18.K645 2
914 ## - VTLS Number
VTLS Number vtls003560158
990 ## - EQUIVALENCES OR CROSS-REFERENCES [LOCAL, CANADA]
Link information for 9XX fields mab
991 ## - LOCAL NOTE (NAMA FAKULTI/INSTITUT/PUSAT)
a Fakulti Undang-Undang
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Library PERPUSTAKAAN UNDANG-UNDANG
Operator's initials, OID (RLIN) 2014-10-05
Cataloger's initials, CIN (RLIN) m
Material Type (Sierra) Printed Books
Language English
Country
-- 0
-- .b15907740
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Coded location qualifier Cost, normal purchase price Inventory number Total checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
        PERPUSTAKAAN UNDANG-UNDANG PERPUSTAKAAN UNDANG-UNDANG KOLEKSI AM-P. UNDANG-UNDANG 12/11/2019 - 1 273.13 .i20538145 6 C18.K645 2 00001520931 18/09/2025 1 18/09/2025 AM

Contact Us

Perpustakaan Tun Seri Lanang, Universiti Kebangsaan Malaysia
43600 Bangi, Selangor Darul Ehsan,Malaysia
+603-89213446 – Consultation Services
019-2045652 – Telegram/Whatsapp
Email: helpdeskptsl@ukm.edu.my

Copyright ©The National University of Malaysia Library