Computer security handbook edited by Seymour Bosworth, M.E. Kabay.

The definitive formula for computer security, from power outages to theft and sabotage Whether you are in charge of many computers, or even one important one, there are immediate steps you can take to safeguard your company's computer system and its contents. The Computer Security Handbook prov...

Full description

Saved in:
Bibliographic Details
Other Authors: Bosworth, Seymour, Kabay, Michel E.
Format: eBook
Language:English
Published: New York : John Wiley & Sons, c2002.
Edition:4th ed.
Series:Ebsco e-book purchased.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
This was purchased from Ebsco with a single user license.

MARC

LEADER 00000cam a2200000Ia 4500
001 b1937634
003 MWH
005 20140124025427.0
006 m o d
007 cr cn|
008 021216s2002 nyua ob 001 0 eng d
019 |a 53700278  |a 61071587  |a 61322433  |a 70656040  |a 269592502  |a 532348723  |a 647772177  |a 702103291  |a 756233420 
020 |a 0471269751 (electronic bk.) 
020 |a 9780471269755 (electronic bk.) 
020 |a 0471412589 (print) 
020 |a 9780471412588 (print) 
029 1 |a NZ1  |b 11771360 
029 1 |a AU@  |b 000043011298 
029 1 |a AU@  |b 000043380345 
035 |a (OCoLC)51231704 
035 |a (OCoLC)51231704  |z (OCoLC)53700278  |z (OCoLC)61071587  |z (OCoLC)61322433  |z (OCoLC)70656040  |z (OCoLC)269592502  |z (OCoLC)532348723  |z (OCoLC)647772177  |z (OCoLC)702103291  |z (OCoLC)756233420 
037 |b OverDrive, Inc.  |n http://www.overdrive.com 
040 |a N$T  |b eng  |c N$T  |d YDXCP  |d OCLCQ  |d EXW  |d OCLCQ  |d TUU  |d OCLCQ  |d TNF  |d TEFOD  |d BTCTA  |d IDEBK  |d N15  |d UAB  |d B24X7  |d EBLCP  |d AU@  |d E7B  |d OCLCQ  |d REDDC  |d OCLCQ  |d GRPVE  |d OCLCO  |d OCLCQ  |d OCLCF 
049 |a HCDD 
050 4 |a E-Book HF5548.37  |b .C64 2002 
072 7 |a BUS  |x 097000  |2 bisacsh 
072 7 |a BUS  |x 104000  |2 bisacsh 
072 7 |a BUS  |x 071000  |2 bisacsh 
072 7 |a BUS  |x 103000  |2 bisacsh 
245 0 0 |a Computer security handbook  |h [electronic resource] /  |c edited by Seymour Bosworth, M.E. Kabay. 
250 |a 4th ed. 
260 |a New York :  |b John Wiley & Sons,  |c c2002. 
300 |a 1 online resource (1 v. (various pagings)) :  |b ill. 
490 1 |a Ebsco e-book purchased 
504 |a Includes bibliographical references and index. 
505 0 0 |t Foundations of Computer Security --  |t Brief History and Mission of Information System Security /  |r Seymour Bosworth, Robert V. Jacobson --  |t Cyberspace Law and Computer Forensics /  |r Robert Heverly, Morgan Wright --  |t Using a "Common Language" for Computer Security Incident Information /  |r John D. Howard, Pascal Meunier --  |t Studies and Surveys of Computer Crime /  |r M.E. Kabay --  |t Toward a New Framework for Information Security /  |r Donn B. Parker --  |t Threats and Vulnerabilities --  |t The Psychology of Computer Criminals /  |r Quinn Campbell, David M. Kennedy --  |t Information Warfare /  |r Seymour Bosworth --  |t Penetrating Computer Systems and Networks /  |r Chey Cobb, Stephen Cobb, M.E. Kabay --  |t Malicious Code /  |r Roger Thompson --  |t Mobile Code /  |r Robert Gezelter --  |t Denial of Service Attacks /  |r Diane E. Levine, Gary C. Kessler --  |t The Legal Framework for Protecting Intellectual Property in the Field of Computing and Computer Software /  |r William A. Zucker, Scott J. Nathan --  |t E-Commerce Vulnerabilities /  |r Anup K. Ghosh --  |t Physical Threats to the Information Infrastructure /  |r Franklin N. Platt --  |t Prevention: Technical Defenses --  |t Protecting the Information Infrastructure /  |r Franklin N. Platt --  |t Identification and Authentication /  |r Ravi Sandhu --  |t Operating System Security /  |r William Stallings --  |t Local Area Networks /  |r Gary C. Kessler, N. Todd Pritsky --  |t E-Commerce Safeguards /  |r Jeffrey B. Ritter, Michael Money --  |t Firewalls and Proxy Servers /  |r David Brussin --  |t Protecting Internet-Visible Systems /  |r Robert Gezelter --  |t Protecting Web Sites /  |r Robert Gezelter. 
520 |a The definitive formula for computer security, from power outages to theft and sabotage Whether you are in charge of many computers, or even one important one, there are immediate steps you can take to safeguard your company's computer system and its contents. The Computer Security Handbook provides a readable and comprehensive resource for protecting computer mainframe systems and PC networks. 
588 |a Description based on print version record. 
590 |a Loaded electronically. 
590 |a Electronic access restricted to members of the Holy Cross Community. 
590 |a This was purchased from Ebsco with a single user license. 
650 0 |a Electronic data processing departments  |x Security measures. 
690 |a Electronic resources (E-books) 
700 1 |a Bosworth, Seymour. 
700 1 |a Kabay, Michel E. 
830 0 |a Ebsco e-book purchased. 
856 4 0 |u https://holycross.idm.oclc.org/login?auth=cas&url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=74241  |3 Click to view e-book  |t 0 
907 |a .b19376340  |b 04-18-22  |c 02-07-14 
998 |a he  |b 02-07-14  |c m  |d @   |e    |f eng  |g nyu  |h 0  |i 1 
938 |a YBP Library Services  |b YANK  |n 2297828 
938 |a Baker and Taylor  |b BTCP  |n bl2003013530 
938 |a Books 24x7  |b B247  |n bks00003988 
938 |a ebrary  |b EBRY  |n ebr10299259 
938 |a EBL - Ebook Library  |b EBLB  |n EBL139914 
938 |a EBSCOhost  |b EBSC  |n 74241 
994 |a 92  |b HCD 
902 |a Purchased Ebsco (formally NetLibrary) e-book 
903 |a EEB-NET 
945 |f  - -   |g 1  |h 0  |j  - -   |k  - -   |l he   |o -  |p $0.00  |q -  |r -  |s b   |t 38  |u 0  |v 0  |w 0  |x 0  |y .i16465933  |z 02-07-14 
999 f f |i 6ccd076d-c9a5-5d5a-83f9-3c465fd9ceba  |s 81f395db-12c6-54d6-b53e-91440603b181  |t 0 
952 f f |p Online  |a College of the Holy Cross  |b Main Campus  |c E-Resources  |d Online  |t 0  |e E-Book HF5548.37 .C64 2002  |h Library of Congress classification  |i Elec File