It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 03166cam 2200541Ia 4500
001 ocm55736992
003 OCoLC
005 20200824210409.0
008 040625s2004 maua 001 0 eng d
006 m m
007 co cgu|auuau||
040 $aSITPL$beng$cSITPL$dIBI$dOCLCQ$dBAKER$dYDXCP$dOCLCG$dAU@$dBHL$dBDX$dOCLCF$dOCLCO$dOCLCQ$dTOH$dBTCTA$dB9K$dI8M$dOCLCQ$dOCLCA$dAPUMS$dOCLCQ$dOL$$dZQP
019 $a63091075$a970555316$a1027925250$a1071773325$a1091361861$a1102095961$a1114450107
020 $a0072255099$q(pbk.)
020 $a9780072255096$q(pbk.)
020 $a0072256435
020 $a9780072256437
020 $a0072256443
020 $a9780072256444
020 $a0071245006
020 $a9780071245005
035 $a(OCoLC)55736992$z(OCoLC)63091075$z(OCoLC)970555316$z(OCoLC)1027925250$z(OCoLC)1071773325$z(OCoLC)1091361861$z(OCoLC)1102095961$z(OCoLC)1114450107
050 4 $aQA76.9.A25$bP75 2004
082 04 $a005.8$222
245 00 $aPrinciples of computer security :$bSecurity+ and beyond /$cWm. Arthur Conklin [and others].
260 $aBoston, Mass. :$bMcGraw-Hill Technology Education,$c©2004.
300 $axxxvi, 665 pages :$billustrations ;$c24 cm +$e1 CD-ROM (4 3/4 in.).
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
490 1 $aInformation assurance & security series
500 $aIncludes index.
538 $aSystem requirements for accompanying CD-ROM: PC; Windows 98 or later; Internet Explorer 5.0 or later. Electronic book requires Adobe Acrobat Reader.
505 00 $gCh. 1.$tIntroduction and security trends --$gCh. 2.$tGeneral security concepts --$gCh. 3.$tOperational/organizational security --$gCh. 4.$trole of people in security --$gCh. 5.$tCryptography --$gCh. 6.$tPublic key infrastructure --$gCh. 7.$tStandards and protocols --$gCh. 8.$timpact of physical security on network security --$gCh. 9.$tNetwork fundamentals --$gCh. 10.$tInfrastructure security --$gCh. 11.$tRemote access --$gCh. 12.$tWireless and instant messaging --$gCh. 13.$tIntrusion detection systems --$gCh. 14.$tSecurity baselines --$gCh. 15.$tAttacks and malware --$gCh. 16.$tE-mail --$gCh. 17.$tWeb components --$gCh. 18.$tSoftware development --$gCh. 19.$tDisaster recovery, business continuity, and organizational policies --$gCh. 20.$tRisk management --$gCh. 21.$tChange management --$gCh. 22.$tPrivilege management --$gCh. 23.$tComputer forensics --$gCh. 24.$tSecurity and law --$gApp.$tAbout the security+ exam.
504 $aIncludes index.
650 0 $aComputer security.
650 7 $aComputer security.$2fast$0(OCoLC)fst00872484
700 1 $aConklin, Wm. Arthur$q(William Arthur)
830 0 $aInformation assurance & security series.
938 $aBaker & Taylor$bBKTY$c96.25$d96.25$i0072255099$n0006018726$sactive
938 $aBrodart$bBROD$n02268906$c$88.25
938 $aBaker and Taylor$bBTCP$nBK0006018726
938 $aYBP Library Services$bYANK$n2090478
029 1 $aAU@$b000025954488
029 1 $aNZ1$b8743176
029 1 $aYDXCP$b2090478
994 $aZ0$bP4A
948 $hNO HOLDINGS IN P4A - 112 OTHER HOLDINGS