Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--

Computer security fundamentals / (Record no. 8037)

MARC details
000 -LEADER
fixed length control field 07763cam a22003734i 4500
001 - CONTROL NUMBER
control field 17102749
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210427110647.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 120103s2012 inua 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2011049997
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780789748904 (pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0789748908 (pbk.)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency YDX
-- BTCTA
-- YDXCP
-- BWX
-- DLC
Description conventions rda
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
Item number E.C.C
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Easttom, Chuck.
245 10 - TITLE STATEMENT
Title Computer security fundamentals /
Statement of responsibility, etc Chuck Easttom.
250 ## - EDITION STATEMENT
Edition statement 2nd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Indianapolis, Ind. :
Name of publisher, distributor, etc Pearson,
Date of publication, distribution, etc c2012.
300 ## - PHYSICAL DESCRIPTION
Extent xvi, 333 pages. :
Other physical details illustrations ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1: Introduction to Computer Security<br/>Introduction<br/>How Seriously Should You Take Threats to Network Security?<br/>Identifying Types of Threats<br/> Malware<br/> Compromising System Security<br/> Denial of Service Attacks<br/> Web Attacks<br/> Session Hijacking<br/> DNS Poisoning<br/>Assessing the Likelihood of an Attack on Your Network<br/>Basic Security Terminology<br/> Hacker Slang<br/> Professional Terms<br/>Concepts and Approaches<br/>How Do Legal Issues Impact Network Security?<br/>Online Security Resources<br/> CERT<br/> Microsoft Security Advisor<br/> F-Secure<br/> SANS Institute<br/>Summary<br/>
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Test Your Skills<br/>Chapter 2: Networks and the Internet<br/>Introduction<br/>Network Basics<br/> The Physical Connection: Local Networks<br/> Faster Connection Speeds<br/> Data Transmission<br/>How the Internet Works<br/> IP Addresses<br/> CIDR<br/> Uniform Resource Locators<br/>History of the Internet<br/>Basic Network Utilities<br/> IPConfig<br/> Ping<br/> Tracert<br/>Other Network Devices<br/>Advanced Network Communications Topics<br/> The OSI Model<br/> Media Access Control (MAC) Addresses<br/>Summary<br/>Test Your Skills<br/>
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 3: Cyber Stalking, Fraud, and Abuse<br/>Introduction<br/>How Internet Fraud Works<br/> Investment Offers<br/> Auction Frauds<br/>Identity Theft<br/> Phishing<br/>Cyber Stalking<br/> Laws about Internet Fraud<br/>Protecting Yourself against Cyber Crime<br/> Protecting against Investment Fraud<br/> Protecting against Identity Theft<br/> Secure Browser Settings<br/>Summary<br/>Test Your Skills<br/>Chapter Footnotes<br/>Chapter 4: Denial of Service Attacks<br/>Introduction<br/>Denial of Service<br/>Illustrating an Attack<br/> Common Tools Used for DoS<br/> DoS Weaknesses<br/> Specific DoS Attacks<br/> Land Attack<br/> Distributed Denial of Service (DDoS)<br/>Summary<br/>Test Your Skills<br/>Chapter 5: Malware<br/>Introduction<br/>Viruses<br/> How a Virus Spreads<br/> Recent Virus Examples<br/> W32/Netsky-P<br/> Troj/Invo-Zip<br/> MacDefender<br/> The Sobig Virus<br/> The Mimail Virus<br/> The Bagle Virus<br/> A Nonvirus Virus<br/> Rules for Avoiding Viruses<br/>Trojan Horses .<br/>The Buffer-Overflow Attack<br/>The Sasser Virus/Buffer Overflow<br/>Spyware<br/> Legal Uses of Spyware<br/> How Is Spyware Delivered to a Target System?<br/> Obtaining Spyware Software<br/>Other Forms of Malware<br/> Rootkit<br/> Malicious Web-Based Code<br/> Logic Bombs<br/> Spam<br/>Detecting and Eliminating Viruses and Spyware<br/> Antivirus Software<br/> Antispyware Software<br/>Summary<br/>Test Your Skills<br/>
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 6: Techniques Used by Hackers<br/>Introduction<br/>Basic Terminology<br/>The Reconnaissance Phase<br/> Passive Scanning Techniques<br/> Active Scanning Techniques<br/>Actual Attacks<br/> SQL Script Injection<br/> Cross-Site Scripting<br/> Password Cracking<br/>Summary<br/>Test Your Skills<br/>Chapter 7: Industrial Espionage in Cyberspace<br/>Introduction<br/>What Is Industrial Espionage?<br/>Information as an Asset<br/>Real-World Examples of Industrial Espionage<br/> Example 1: VIA Technology<br/> Example 2: General Motors<br/> Example 3: Interactive Television Technologies, Inc.<br/> Example 4: Bloomberg, Inc<br/> Example 5: Avant Software<br/>Industrial Espionage and You<br/>How Does Espionage Occur?<br/> Low-Tech Industrial Espionage<br/> Spyware Used in Industrial Espionage<br/> Steganography Used in Industrial Espionage<br/>Phone Taps and Bugs<br/>Protecting against Industrial Espionage<br/>Industrial Espionage Act<br/>Spear Phishing<br/>Summary<br/>Test Your Skills<br/>
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 8: Encryption<br/>Introduction<br/>Cryptography Basics<br/>History of Encryption<br/> The Caesar Cipher<br/> Multi-Alphabet Substitution<br/> Binary Operations<br/>Modern Methods<br/> Single-Key (Symmetric) Encryption<br/> Public Key (Asymmetric) Encryption<br/>Legitimate Versus Fraudulent Encryption Methods<br/> Digital Signatures<br/> Hashing<br/> Authentication<br/>Encryptions Used in Internet<br/>Virtual Private Networks<br/> PPTP<br/> L2TP<br/> IPsec<br/>Summary<br/>Test Your Skills<br/>Chapter 9: Computer Security Software<br/>Introduction<br/>Virus Scanners<br/> How Does a Virus Scanner Work?<br/> Virus-Scanning Techniques<br/> Commercial Antivirus Software<br/>Firewalls<br/> Benefits and Limitation of Firewalls<br/> Firewall Types and Components<br/> How Firewalls Examine Packets<br/> Firewall Configurations<br/> Commercial and Free Firewall Products<br/> Firewall Logs<br/>Antispyware<br/>Intrusion-Detection Software<br/> IDS Categorization<br/> IDS Approaches<br/> Snort<br/> Honey Pots<br/> Other Preemptive Techniques<br/>Summary<br/>Test Your Skills<br/>Chapter 10: Security Policies<br/>Introduction<br/>What Is a Policy<br/>Defining User Policies<br/> Passwords<br/> Internet Use<br/> Email Usage<br/> Installing/Uninstalling Software<br/> Instant Messaging<br/> Desktop Configuration<br/> Final Thoughts on User Policies<br/>Defining System Administration Policies<br/> New Employees<br/> Departing Employees<br/> Change Requests<br/> Security Breaches<br/> Virus Infection<br/> Denial of Service Attacks<br/> Intrusion by a Hacker<br/>Defining Access Control<br/>Developmental Policies<br/>Standards, Guidelines, and Procedures<br/>Summary<br/>Test Your Skills<br/>
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 11: Network Scanning and Vulnerability Scanning<br/>Introduction<br/>Basics of Assessing a System<br/> Patch<br/> Ports<br/> Protect<br/> Policies<br/> Probe<br/> Physical<br/>Securing Computer Systems<br/> Securing an Individual Workstation<br/> Securing a Server<br/> Securing a Network<br/>Scanning Your Network<br/> MBSA<br/> NESSUS<br/>Getting Professional Help<br/>Summary<br/>Test Your Skills<br/>Chapter 12: Cyber Terrorism and Information Warfare<br/>Introduction<br/>Actual Cases of Cyber Terrorism<br/>China Eagle Union<br/>Economic Attacks<br/>Military Operations Attacks<br/>General Attacks<br/>Supervisory Control and Data Acquisitions<br/>Information Warfare<br/> Propaganda<br/> Information Control<br/> Disinformation<br/>Actual Cases<br/>Future Trends<br/> Positive Trends<br/> Negative Trends<br/>Defense against Cyber Terrorism<br/>Summary<br/>Test Your Skills<br/>Chapter 13: Cyber Detective<br/>Introduction<br/>General Searches<br/>Court Records and Criminal Checks<br/> Sex Offender Registries<br/> Civil Court Records<br/> Other Resources<br/>Usenet<br/>Summary<br/>Test Your Skills<br/>Chapter 14: Introduction to Forensics<br/>Introduction<br/>General Guidelines<br/> Don’t Touch the Suspect Drive<br/> Document Trail<br/> Secure the Evidence<br/> FBI Forensics Guidelines<br/>Finding Evidence on the PC<br/> Finding Evidence in the Browser<br/>Finding Evidence in System Logs<br/> Windows Logs<br/> Linux Logs<br/>Getting Back Deleted Files<br/>Operating System Utilities<br/> Net Sessions<br/> Openfiles<br/> Fc<br/> Netstat<br/>The Windows Registry<br/>Summary<br/>Test Your Skills<br/>Appendix A: Glossary<br/>Appendix B: Resources<br/>General Computer Crime and Cyber Terrorism<br/>General Knowledge<br/>Cyber Stalking<br/>Identity Theft<br/>Port Scanners and Sniffers<br/>Password Crackers<br/>Countermeasures<br/>Spyware<br/>
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
856 ## - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract
Uniform Resource Identifier <a href="http://repository.fue.edu.eg/xmlui/handle/123456789/3541">http://repository.fue.edu.eg/xmlui/handle/123456789/3541</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
Source of classification or shelving scheme Dewey Decimal Classification
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Inventory number Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
  Dewey Decimal Classification     Computers & Information Technology ( Computer Science ) Main library Main library A2 16/02/2014 Abo el Hol publisher 290.00 PU   005.8 E.C.C 00010451 19/02/2025 16/02/2014 Books