Introduction to security and network forensics / (Record no. 10528)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01538nam a2200229Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250520100643.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 250520s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780849335686 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA 76.9.A25 .B83 2011 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Buchanan, William J. |
Relator term | author |
245 #0 - TITLE STATEMENT | |
Title | Introduction to security and network forensics / |
Statement of responsibility, etc. | William J. Buchanan. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Boca Raton, Florida : |
Name of publisher, distributor, etc. | CRC Press, |
Date of publication, distribution, etc. | c2011 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xv, 486 pages : |
Other physical details | illustrations ; |
Dimensions | 26 cm. |
365 ## - TRADE PRICE | |
Price amount | USD55.77 |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes bibliographical references and index. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Introduction to security -- Intrusion detection systems -- Encryption -- Authentication, hashing, and digital certificates -- Enhanced software security -- Network security elements -- Introduction to risk -- Threat analysis -- Network forensics -- Data hiding and obfuscation -- Web infastructures -- Cloud/Grid computing -- Appendix A. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Keeping up with the latest developments in cyber security requires ongoing commitment, but without a firm foundation in the principles in computer security and digital forensics, those tasked with safeguarding our most private information will be lost in a turbulent and shifting sea. Providing such an introductory text, Introduction to Security and Network Forensics covers the basic principles of intrusion detection systems, encryption, and authentication, as well as the key academic principles related to digital forensics. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTER SECURITY |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Total checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Library of Congress Classification | Digital Forensic | LRC - Main | National University - Manila | General Circulation | 11/18/2014 | Purchased - Amazon | 55.77 | GC QA 76.9.A25 .B83 2011 c.1 | NULIB000008287 | 05/20/2025 | c.1 | 05/20/2025 | Books |