MARC details
| 000 -LEADER |
| fixed length control field |
02240nam a2200313 i 4500 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
CSPC |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20260305141608.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
260304s2024 nyua b 001 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781647285845 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
CSPC |
| Language of cataloging |
eng |
| Transcribing agency |
CSPC |
| Description conventions |
rda |
| 050 04 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
QA76.6.A25 |
| Item number |
.W938 2024 |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Edition number |
23 |
| Classification number |
005.8 |
| Item number |
W97c |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Wyatt, Dariel, |
| Relator term |
author. |
| 245 10 - TITLE STATEMENT |
| Title |
Computer security : |
| Remainder of title |
art and science / |
| Statement of responsibility, etc. |
Dariel Wyatt. |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Place of production, publication, distribution, manufacture |
Forest Hills, New York : |
| Name of producer, publisher, distributor, manufacturer |
Willford Press, |
| Date of production, publication, distribution, manufacture, or copyright notice |
2024. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
viii, 274 pages : |
| Other physical details |
illustrations ; |
| Dimensions |
25 cm. |
| 336 ## - CONTENT TYPE |
| Source |
rdacontent |
| Content type term |
text |
| 337 ## - MEDIA TYPE |
| Source |
rdamedia |
| Media type term |
unmediated |
| 338 ## - CARRIER TYPE |
| Source |
rdacarrier |
| Carrier type term |
volume |
| 490 0# - SERIES STATEMENT |
| Series statement |
Knowledge series |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc. note |
Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Computer security: an introduction -- Access control principles in computer society -- Steps in computer society -- Network and internet security measures -- Understanding malicious software -- Software solutions for computer security. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
"Computer security involves safeguarding computers from theft or damage to their data, hardware, and software. It also encompasses protecting computer systems from disruption or misdirection of services they provide. Threats to computer security are wide-ranging and not limited to phishing, spoofing, denial-of-service attacks, backdoors, and direct-access attacks. With growing reliance on computer technology, the internet, wireless networks, and smart devices, computer security has become increasingly crucial. Countermeasures against cyberattacks include security by design, secure coding, security architecture, and hardware protection mechanisms. The topics covered in this extensive book deal with the core concepts related to computer security. It is upcoming field that has undergone rapid development over the past few decades. This book will serve as a valuable source of reference for graduate and postgraduate students"-- Back cover. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer security. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer networks |
| General subdivision |
Security measures. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Data protection. |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Dewey Decimal Classification |
| Suppress in OPAC |
No |
| Koha item type |
Books |
| Classification part |
005.8 |
| Item part |
W97c |
| Call number prefix |
CIR |
| Call number suffix |
2024 |
| Edition |
23 |