MARC details
| 000 -LEADER |
| fixed length control field |
07763cam a22003734i 4500 |
| 001 - CONTROL NUMBER |
| control field |
17102749 |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20210427110647.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
120103s2012 inua 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2011049997 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9780789748904 (pbk.) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
0789748908 (pbk.) |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
DLC |
| Transcribing agency |
DLC |
| Modifying agency |
YDX |
| -- |
BTCTA |
| -- |
YDXCP |
| -- |
BWX |
| -- |
DLC |
| Description conventions |
rda |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Edition number |
23 |
| Item number |
E.C.C |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Easttom, Chuck. |
| 245 10 - TITLE STATEMENT |
| Title |
Computer security fundamentals / |
| Statement of responsibility, etc |
Chuck Easttom. |
| 250 ## - EDITION STATEMENT |
| Edition statement |
2nd ed. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc |
Indianapolis, Ind. : |
| Name of publisher, distributor, etc |
Pearson, |
| Date of publication, distribution, etc |
c2012. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xvi, 333 pages. : |
| Other physical details |
illustrations ; |
| Dimensions |
24 cm. |
| 336 ## - CONTENT TYPE |
| Source |
rdacontent |
| Content type term |
text |
| 337 ## - MEDIA TYPE |
| Source |
rdamedia |
| Media type term |
unmediated |
| 338 ## - CARRIER TYPE |
| Source |
rdacarrier |
| Carrier type term |
volume |
| 500 ## - GENERAL NOTE |
| General note |
Includes index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Chapter 1: Introduction to Computer Security<br/>Introduction<br/>How Seriously Should You Take Threats to Network Security?<br/>Identifying Types of Threats<br/> Malware<br/> Compromising System Security<br/> Denial of Service Attacks<br/> Web Attacks<br/> Session Hijacking<br/> DNS Poisoning<br/>Assessing the Likelihood of an Attack on Your Network<br/>Basic Security Terminology<br/> Hacker Slang<br/> Professional Terms<br/>Concepts and Approaches<br/>How Do Legal Issues Impact Network Security?<br/>Online Security Resources<br/> CERT<br/> Microsoft Security Advisor<br/> F-Secure<br/> SANS Institute<br/>Summary<br/> |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Test Your Skills<br/>Chapter 2: Networks and the Internet<br/>Introduction<br/>Network Basics<br/> The Physical Connection: Local Networks<br/> Faster Connection Speeds<br/> Data Transmission<br/>How the Internet Works<br/> IP Addresses<br/> CIDR<br/> Uniform Resource Locators<br/>History of the Internet<br/>Basic Network Utilities<br/> IPConfig<br/> Ping<br/> Tracert<br/>Other Network Devices<br/>Advanced Network Communications Topics<br/> The OSI Model<br/> Media Access Control (MAC) Addresses<br/>Summary<br/>Test Your Skills<br/> |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Chapter 3: Cyber Stalking, Fraud, and Abuse<br/>Introduction<br/>How Internet Fraud Works<br/> Investment Offers<br/> Auction Frauds<br/>Identity Theft<br/> Phishing<br/>Cyber Stalking<br/> Laws about Internet Fraud<br/>Protecting Yourself against Cyber Crime<br/> Protecting against Investment Fraud<br/> Protecting against Identity Theft<br/> Secure Browser Settings<br/>Summary<br/>Test Your Skills<br/>Chapter Footnotes<br/>Chapter 4: Denial of Service Attacks<br/>Introduction<br/>Denial of Service<br/>Illustrating an Attack<br/> Common Tools Used for DoS<br/> DoS Weaknesses<br/> Specific DoS Attacks<br/> Land Attack<br/> Distributed Denial of Service (DDoS)<br/>Summary<br/>Test Your Skills<br/>Chapter 5: Malware<br/>Introduction<br/>Viruses<br/> How a Virus Spreads<br/> Recent Virus Examples<br/> W32/Netsky-P<br/> Troj/Invo-Zip<br/> MacDefender<br/> The Sobig Virus<br/> The Mimail Virus<br/> The Bagle Virus<br/> A Nonvirus Virus<br/> Rules for Avoiding Viruses<br/>Trojan Horses .<br/>The Buffer-Overflow Attack<br/>The Sasser Virus/Buffer Overflow<br/>Spyware<br/> Legal Uses of Spyware<br/> How Is Spyware Delivered to a Target System?<br/> Obtaining Spyware Software<br/>Other Forms of Malware<br/> Rootkit<br/> Malicious Web-Based Code<br/> Logic Bombs<br/> Spam<br/>Detecting and Eliminating Viruses and Spyware<br/> Antivirus Software<br/> Antispyware Software<br/>Summary<br/>Test Your Skills<br/> |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Chapter 6: Techniques Used by Hackers<br/>Introduction<br/>Basic Terminology<br/>The Reconnaissance Phase<br/> Passive Scanning Techniques<br/> Active Scanning Techniques<br/>Actual Attacks<br/> SQL Script Injection<br/> Cross-Site Scripting<br/> Password Cracking<br/>Summary<br/>Test Your Skills<br/>Chapter 7: Industrial Espionage in Cyberspace<br/>Introduction<br/>What Is Industrial Espionage?<br/>Information as an Asset<br/>Real-World Examples of Industrial Espionage<br/> Example 1: VIA Technology<br/> Example 2: General Motors<br/> Example 3: Interactive Television Technologies, Inc.<br/> Example 4: Bloomberg, Inc<br/> Example 5: Avant Software<br/>Industrial Espionage and You<br/>How Does Espionage Occur?<br/> Low-Tech Industrial Espionage<br/> Spyware Used in Industrial Espionage<br/> Steganography Used in Industrial Espionage<br/>Phone Taps and Bugs<br/>Protecting against Industrial Espionage<br/>Industrial Espionage Act<br/>Spear Phishing<br/>Summary<br/>Test Your Skills<br/> |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Chapter 8: Encryption<br/>Introduction<br/>Cryptography Basics<br/>History of Encryption<br/> The Caesar Cipher<br/> Multi-Alphabet Substitution<br/> Binary Operations<br/>Modern Methods<br/> Single-Key (Symmetric) Encryption<br/> Public Key (Asymmetric) Encryption<br/>Legitimate Versus Fraudulent Encryption Methods<br/> Digital Signatures<br/> Hashing<br/> Authentication<br/>Encryptions Used in Internet<br/>Virtual Private Networks<br/> PPTP<br/> L2TP<br/> IPsec<br/>Summary<br/>Test Your Skills<br/>Chapter 9: Computer Security Software<br/>Introduction<br/>Virus Scanners<br/> How Does a Virus Scanner Work?<br/> Virus-Scanning Techniques<br/> Commercial Antivirus Software<br/>Firewalls<br/> Benefits and Limitation of Firewalls<br/> Firewall Types and Components<br/> How Firewalls Examine Packets<br/> Firewall Configurations<br/> Commercial and Free Firewall Products<br/> Firewall Logs<br/>Antispyware<br/>Intrusion-Detection Software<br/> IDS Categorization<br/> IDS Approaches<br/> Snort<br/> Honey Pots<br/> Other Preemptive Techniques<br/>Summary<br/>Test Your Skills<br/>Chapter 10: Security Policies<br/>Introduction<br/>What Is a Policy<br/>Defining User Policies<br/> Passwords<br/> Internet Use<br/> Email Usage<br/> Installing/Uninstalling Software<br/> Instant Messaging<br/> Desktop Configuration<br/> Final Thoughts on User Policies<br/>Defining System Administration Policies<br/> New Employees<br/> Departing Employees<br/> Change Requests<br/> Security Breaches<br/> Virus Infection<br/> Denial of Service Attacks<br/> Intrusion by a Hacker<br/>Defining Access Control<br/>Developmental Policies<br/>Standards, Guidelines, and Procedures<br/>Summary<br/>Test Your Skills<br/> |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Chapter 11: Network Scanning and Vulnerability Scanning<br/>Introduction<br/>Basics of Assessing a System<br/> Patch<br/> Ports<br/> Protect<br/> Policies<br/> Probe<br/> Physical<br/>Securing Computer Systems<br/> Securing an Individual Workstation<br/> Securing a Server<br/> Securing a Network<br/>Scanning Your Network<br/> MBSA<br/> NESSUS<br/>Getting Professional Help<br/>Summary<br/>Test Your Skills<br/>Chapter 12: Cyber Terrorism and Information Warfare<br/>Introduction<br/>Actual Cases of Cyber Terrorism<br/>China Eagle Union<br/>Economic Attacks<br/>Military Operations Attacks<br/>General Attacks<br/>Supervisory Control and Data Acquisitions<br/>Information Warfare<br/> Propaganda<br/> Information Control<br/> Disinformation<br/>Actual Cases<br/>Future Trends<br/> Positive Trends<br/> Negative Trends<br/>Defense against Cyber Terrorism<br/>Summary<br/>Test Your Skills<br/>Chapter 13: Cyber Detective<br/>Introduction<br/>General Searches<br/>Court Records and Criminal Checks<br/> Sex Offender Registries<br/> Civil Court Records<br/> Other Resources<br/>Usenet<br/>Summary<br/>Test Your Skills<br/>Chapter 14: Introduction to Forensics<br/>Introduction<br/>General Guidelines<br/> Don’t Touch the Suspect Drive<br/> Document Trail<br/> Secure the Evidence<br/> FBI Forensics Guidelines<br/>Finding Evidence on the PC<br/> Finding Evidence in the Browser<br/>Finding Evidence in System Logs<br/> Windows Logs<br/> Linux Logs<br/>Getting Back Deleted Files<br/>Operating System Utilities<br/> Net Sessions<br/> Openfiles<br/> Fc<br/> Netstat<br/>The Windows Registry<br/>Summary<br/>Test Your Skills<br/>Appendix A: Glossary<br/>Appendix B: Resources<br/>General Computer Crime and Cyber Terrorism<br/>General Knowledge<br/>Cyber Stalking<br/>Identity Theft<br/>Port Scanners and Sniffers<br/>Password Crackers<br/>Countermeasures<br/>Spyware<br/> |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer networks |
| General subdivision |
Security measures. |
| 856 ## - ELECTRONIC LOCATION AND ACCESS |
| Materials specified |
Abstract |
| Uniform Resource Identifier |
<a href="http://repository.fue.edu.eg/xmlui/handle/123456789/3541">http://repository.fue.edu.eg/xmlui/handle/123456789/3541</a> |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Koha item type |
Books |
| Source of classification or shelving scheme |
Dewey Decimal Classification |