Security strategies in Linux platforms and applications / (Record no. 219419)

000 -LEADER
fixed length control field 01685 a2200253 4500
003 - CONTROL NUMBER IDENTIFIER
control field Nust
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20221018132419.0
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2011281105
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 076379189X
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780763791896
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn650217966
040 ## - CATALOGING SOURCE
Transcribing agency Nust
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8,JAN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Jang, Michael H.
9 (RLIN) 100623
245 10 - TITLE STATEMENT
Title Security strategies in Linux platforms and applications /
Statement of responsibility, etc. Michael Jang.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Sudbury, MA :
Name of publisher, distributor, etc. Jones & Bartlett Learning,
Date of publication, distribution, etc. c2011.
300 ## - PHYSICAL DESCRIPTION
Extent xxiii, 509 p. :
Other physical details ill. ;
Dimensions 24 cm.
490 1# - SERIES STATEMENT
Series statement Jones & Bartlett Learning information systems security & assurance series
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note ONE. Is Linux Really Secure? (Page-1), Security Threats to Linux(Page-2), Basic Components of Linux Security(Page-28), TWO. Layered Security and Linux(Page-53), Basic Security: Facilities Through the Boot Process(Page-54), User Privileges and Permissions(Page-83), Filesystems, Volumes, and Encryption(Page-114), Every Service Is a Potential Risk(Page-146), Networks, Firewalls, and More(Page-176), Networked File systems and Remote Access(Page-218), Networked Application Security(Page-251), Kernel Security Risk Mitigation(Page-283),THREE. Building a Layered Linux Security Strategy(Page-315), Managing Security Alerts and Updates(Page-316), Building and Maintaining a Security Baseline(Page-352), Testing and Reporting(Page-378), Detecting and Responding to Security Breaches(Page-418), Best Practices and Emerging Technologies(Page-446).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
9 (RLIN) 570
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Operating systems (Computers)
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Jones & Bartlett Learning information systems security & assurance series.
9 (RLIN) 95180
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Book
Source of classification or shelving scheme
Call number prefix 005.8,JAN
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Full call number Barcode Date last seen Price effective from Koha item type Public note
          Military College of Signals (MCS) Military College of Signals (MCS) General Stacks 12/12/2016 005.8,JAN MCS37457 12/08/2016 12/12/2016 Book Almirah No.9, Shelf No.1
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.