000 -LEADER |
fixed length control field |
03777nam a22004815i 4500 |
001 - CONTROL NUMBER |
control field |
978-1-84628-270-6 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20161121230525.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
100301s2005 xxk| s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781846282706 |
-- |
978-1-84628-270-6 |
024 7# - OTHER STANDARD IDENTIFIER |
Standard number or code |
10.1007/1-84628-270-5 |
Source of number or code |
doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA75.5-76.95 |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UY |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UYA |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
COM014000 |
Source |
bisacsh |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
COM031000 |
Source |
bisacsh |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
004.0151 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Furnell, Steven. |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Computer Insecurity |
Medium |
[electronic resource] : |
Remainder of title |
Risking the System / |
Statement of responsibility, etc. |
by Steven Furnell. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
London : |
Name of producer, publisher, distributor, manufacturer |
Springer London, |
Date of production, publication, distribution, manufacture, or copyright notice |
2005. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
XIII, 240 p. 30 illus. |
Other physical details |
online resource. |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
computer |
Media type code |
c |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Carrier type code |
cr |
Source |
rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS |
File type |
text file |
Encoding format |
PDF |
Source |
rda |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
The Problem of Computer Insecurity -- The Need to Raise Awareness -- Common Failings That Compromise Security -- The Widespread Nature of Vulnerability -- Attack and Exploitation of Systems -- External Influences and Dependencies -- Insecurity: Here Today, Here Tomorrow?. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Security is one of the most significant issues facing the owners and users of computer systems in the Internet age, and recent years have convincingly illustrated that the problem is increasing in both scale and cost. Computer Insecurity: Risking the System approaches its topic from the perspective of vulnerability – how can your system be attacked? Covering technical issues and human factors, the comprehensively researched text makes reference to numerous real-life security incidents, which help to provide persuasive practical evidence of the problems and the impacts that result. Key issues covered include: • the problem of computer insecurity • the need to raise security awareness • common failings that compromise protection • the attack and exploitation of systems • considerations in responding to the threats Presented in clear and lucid terms, the discussion is invaluable reading for all business and computing professionals who wish for an overview of the issues rather than a shopping list of the security measures available. ‘In today’s connected world no-one can afford to ignore computer security, this book tells you why, and what you should do about it, in simple non-technical language.’ Dr Jeremy Ward, Director of Service Development, Symantec (UK) Ltd ‘Computer Insecurity contains loads of practical advice supported by an abundance of real world examples and research. If you don’t understand what all the fuss concerning computer security is about then this book was written for you.’Jeff Crume, CISSP Executive IT Security Architect, IBM and author of ‘Inside Internet Security – What hackers don’t want you to know’ ‘I have long been looking for a book that would give answers to why rather than how we cater for Information and Communication Systems Security ... I recommend it wholeheartedly to anyone that wishes to extend their knowledge’ Professor Sokratis K. Katsikas, University of the Aegean, Greece. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer science. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Data encryption (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computers. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Management information systems. |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer Science. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Theory of Computation. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Management of Computing and Information Systems. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Data Encryption. |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY |
Title |
Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Printed edition: |
International Standard Book Number |
9781852339432 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
http://dx.doi.org/10.1007/1-84628-270-5 |
912 ## - |
-- |
ZDB-2-SCS |