It looks like you're offline.
Open Library logo
additional options menu

MARC Record from marc_openlibraries_sanfranciscopubliclibrary

Record ID marc_openlibraries_sanfranciscopubliclibrary/sfpl_chq_2018_12_24_run04.mrc:145158549:4166
Source marc_openlibraries_sanfranciscopubliclibrary
Download Link /show-records/marc_openlibraries_sanfranciscopubliclibrary/sfpl_chq_2018_12_24_run04.mrc:145158549:4166?format=raw

LEADER: 04166cam a2200649Ia 4500
001 150370629
003 OCoLC
005 20151005085120.0
008 080411s2009 enka b 001 0 eng
010 $a2010275793
015 $aGBA868263$2bnb
016 7 $a014621056$2Uk
020 $a9780596527488 (pbk.)
020 $a0596527489 (pbk.)
029 1 $aBWX$bR0782816
029 1 $aCDX$b5304475
029 1 $aAU@$b000044322882
035 $a150370629
035 $a(OCoLC)150370629
037 $bOreilly & Associates Inc, C/O Ingram Pub Services 1 Ingram Blvd, LA Vergne, TN, USA, 37086$nSAN 631-8673
040 $aUKM$cUKM$dBTCTA$dBAKER$dYDXCP$dBWX$dCDX$dTXA$dCOO$dVP@$dYBM$dPGC$dSEO$dDLC$dCS1$dSFR$dUtOrBLW
049 $aSFRA
050 4 $aTK5105.59$b.B423 2009
082 04 $a005.8$222
092 $a005.8$bB3854
245 00 $aBeautiful security /$cedited by Andy Oram and John Viega.
246 1 $iCover subtitle :$aLeading security experts explain how they think
250 $a1st ed.
260 $aSebastopol, CA :$bO'Reilly,$c2009.
300 $axv, 281 p. :$bill. ;$c24 cm.
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
490 1 $aTheory in practice
504 $aIncludes bibliographical references and index.
505 00 $tPsychological security traps /$rPeiter "Mudge" Zatko --$tWireless networking : fertile ground for social engineering /$rJim Stickley --$tBeautiful security metrics /$rElizabeth A. Nichols --$tThe underground economy of security breaches /$rChenxi Wang --$tBeautiful trade : rethinking E-commerce security /$rEd Bellis --$tSecuring online advertising : rustlers and sheriffs in the new wild west /$rBenjamin Edelman --$tThe evolution of PGP's Web of Trust /$rPhil Zimmermann and Jon Callas --$tOpen source honeyclient : proactive detection of client-side exploits /$rKathy Wang --$tTomorrow's security cogs and levers /$rMark Curphey --$tSecurity by design /$rJohn McManus --$tForcing firms to focus : is secure software in your future? /$rJim Routh --$tOh no, here come the infosecurity lawyers! /$rRandy V. Sabett --$tBeautiful log handling /$rAnton Chuvakin --$tIncident detection : finding the other 68% /$rGrant Geyer and Brian Dunphy --$tDoing real work without real data /$rPeter Wayner --$tCasting spells : PC security theater /$rMichael Wood and Fernando Francisco
520 $aLeaders in the field of security describe bold and extraordinary projects in securing computer systems. This book is a diverse and though-provoking anthology, like Beautiful Code, that shows the state of a major field through stories and insightful analyses. The authors describe how they arrived at unusual solutions to problems such as writing secure code, designing applications securely, and dealing with modern challenges such as wireless security and Internet challenges. This book will make security a cool topic and get people talking.
650 0 $aComputer networks$xSecurity measures.
700 1 $aOram, Andrew.
700 1 $aViega, John.
830 0 $aTheory in practice (Sebastopol, Calif.)
907 $a.b24151610$b12-20-18$c04-07-11
998 $axbt$b06-17-11$cm$da $e-$feng$genk$h0$i0
957 00 $aOCLC reclamation of 2017-18
907 $a.b24151610$b08-07-14$c04-07-11
938 $aBaker and Taylor$bBTCP$nBK0006887482
938 $aBaker & Taylor$bBKTY$c39.99$d29.99$i0596527489$n0006887482$sactive
938 $aYBP Library Services$bYANK$n2527348
938 $aBlackwell Book Service$bBBUS$nR0782816$c$39.99
938 $aCoutts Information Services$bCOUT$n5304475$c39.99 USD
956 $aPre-reclamation 001 value: ocn150370629
980 $a0611 nb mk
998 $axbt$b06-17-11$cm$da$e-$feng$genk$h0$i0
994 $aC0$bSFR
999 $yMARS
945 $a005.8$bB3854$d - - $e12-20-2017 14:59$f0$g0$h03-27-18$i31223096087235$j501$0800$k - - $lxbtci$o-$p$39.99$q-$r-$s- $t1$u13$v19$w0$x2$y.i65440705$z07-25-11
945 $a005.8$bB3854$d - - $e06-30-2018 12:41$f0$g0$h08-02-18$i31223096087227$j331$0800$k - - $lxbtci$o-$p$39.99$q-$r-$s- $t1$u15$v20$w1$x1$y.i65440717$z07-25-11