PC security and virus protection : (Record no. 4781)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02058nam a2200217Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250520094851.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 250520s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1558513906 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA 76.9 .K36 1994 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Kane, Pamela. |
Relator term | author |
245 #0 - TITLE STATEMENT | |
Title | PC security and virus protection : |
Remainder of title | the ongoing war against information sabotage / |
Statement of responsibility, etc. | Pamela Kane. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | New York, NY : |
Name of publisher, distributor, etc. | M&T Publishing, Inc., |
Date of publication, distribution, etc. | c1994 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xx, 523 pages : |
Other physical details | illustrations ; |
Dimensions | 24 cm |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes index. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Ch. 1. Viruses and Security: The Basics -- Ch. 2. A Contemporary Virus History -- Ch. 3. Virus Myths And Mysteries -- Ch. 4. Risk Assessment And Disaster Recovery -- Ch. 5. Hardware Risks -- Ch. 6. Software Risks -- Ch. 7. Data Security -- Ch. 8. Risks You Haven't Even Thought of Yet -- Ch. 9. The Role of Hardware and Software in Solutions -- Ch. 10. A Look at Microsoft Anti-Virus -- Ch. 11. Do Antivirus Programs Work? -- Ch. 12. The Dangers of Experts -- Ch. 13. Disk Contents: The DR. PANDA UTILITIES -- Appendix A: Frequently Asked Questions on VIRUS-L/comp.virus -- Appendix B: The Antiviral Software of MS-DOS 6 -- Appendix C: Computer Viruses: What, Where and When. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | This guide explains the danger of computer virus sabotage and shows readers how to guard themselves and their data against losses due to invasion. It includes risk assessment guidelines and checklist, and gives the reader practical information on security for hardware, software and networks. This comprehensive source of information on PC security and computer-virus protection provides technical details on hundreds of common viruses, explains anti-virus products and software, and explores future risks and tactics for protection. Topics covered include a contemporary virus history, risk assessment, and disaster recovery. Includes anti-viral PandaPro software. Lacks a bibliography. Annotation copyright Book News, Inc. Portland, Or. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | MICROCOMPUTER -- ACCESS CONTROL |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Total checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Library of Congress Classification | Computer Engineering | LRC - Main | National University - Manila | General Circulation | 11/19/2011 | Reaccessioned | GC QA 76.9 .K36 1994 | NULIB000002540 | 05/20/2025 | c.1 | 05/20/2025 | Books |