000 01391 a2200325 4500
003 Nust
005 20170207154038.0
010 _a 2008040626
020 _a0470327227 (v. 1 : pbk.)
020 _a0470327235 (v. 2 : pbk.)
020 _a0471716529 (set : pbk.)
020 _a9780470327227 (v. 1 : pbk.)
020 _a9780470327234 (v. 2 : pbk.)
020 _a9780471716525 (set : pbk.)
035 _a(DLC)15450519
035 _a(DLC)2008040626
035 _a(OCoLC)ocn148798026
040 _cNust
082 0 0 _a658.478
245 0 0 _aComputer security handbook.(E-BOOK)
250 _a5th ed. / edited by Seymour Bosworth, M.E. Kabay, Eric Whyne.
260 _aHoboken, N.J. :
_bJohn Wiley & Sons,
_cc2009.
300 _a2 v. :
_bill. ;
_c26 cm.
505 _aPART I FOUNDATIONS OF COMPUTER SECURITY (Page-11) PART II THREATS AND VULNERABILITIES (Page-65) PART III PREVENTION: TECHNICAL DEFENSES (Page-80) PART IV PREVENTION: HUMAN FACTORS (Page-120) PART V DETECTING SECURITY BREACHES (Page-130) PART VI RESPONSE AND REMEDIATION (Page-145) PART VII MANAGEMENT’S ROLE IN SECURITY (Page-150) PART VIII PUBLIC POLICY AND OTHER CONSIDERATIONS (Page-178)
650 0 _aElectronic data processing departments
_xSecurity measures.
651 _aComputer security handbook.(E-BOOK)
700 1 _aBosworth, Seymour.
700 1 _aKabay, Michel E.
700 1 _aWhyne, Eric,
_d1981-
942 _2ddc
_cBK
999 _c192491
_d192491