PC security and virus protection : (Record no. 4781)

MARC details
000 -LEADER
fixed length control field 02058nam a2200217Ia 4500
003 - CONTROL NUMBER IDENTIFIER
control field NULRC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250520094851.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250520s9999 xx 000 0 und d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1558513906
040 ## - CATALOGING SOURCE
Transcribing agency NULRC
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA 76.9 .K36 1994
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Kane, Pamela.
Relator term author
245 #0 - TITLE STATEMENT
Title PC security and virus protection :
Remainder of title the ongoing war against information sabotage /
Statement of responsibility, etc. Pamela Kane.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New York, NY :
Name of publisher, distributor, etc. M&T Publishing, Inc.,
Date of publication, distribution, etc. c1994
300 ## - PHYSICAL DESCRIPTION
Extent xx, 523 pages :
Other physical details illustrations ;
Dimensions 24 cm
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Ch. 1. Viruses and Security: The Basics -- Ch. 2. A Contemporary Virus History -- Ch. 3. Virus Myths And Mysteries -- Ch. 4. Risk Assessment And Disaster Recovery -- Ch. 5. Hardware Risks -- Ch. 6. Software Risks -- Ch. 7. Data Security -- Ch. 8. Risks You Haven't Even Thought of Yet -- Ch. 9. The Role of Hardware and Software in Solutions -- Ch. 10. A Look at Microsoft Anti-Virus -- Ch. 11. Do Antivirus Programs Work? -- Ch. 12. The Dangers of Experts -- Ch. 13. Disk Contents: The DR. PANDA UTILITIES -- Appendix A: Frequently Asked Questions on VIRUS-L/comp.virus -- Appendix B: The Antiviral Software of MS-DOS 6 -- Appendix C: Computer Viruses: What, Where and When.
520 ## - SUMMARY, ETC.
Summary, etc. This guide explains the danger of computer virus sabotage and shows readers how to guard themselves and their data against losses due to invasion. It includes risk assessment guidelines and checklist, and gives the reader practical information on security for hardware, software and networks. This comprehensive source of information on PC security and computer-virus protection provides technical details on hundreds of common viruses, explains anti-virus products and software, and explores future risks and tactics for protection. Topics covered include a contemporary virus history, risk assessment, and disaster recovery. Includes anti-viral PandaPro software. Lacks a bibliography. Annotation copyright Book News, Inc. Portland, Or.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element MICROCOMPUTER -- ACCESS CONTROL
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Total checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Library of Congress Classification     Computer Engineering LRC - Main National University - Manila General Circulation 11/19/2011 Reaccessioned   GC QA 76.9 .K36 1994 NULIB000002540 05/20/2025 c.1 05/20/2025 Books