Computer security sourcebook / (Record no. 159511)

001 - CONTROL NUMBER
control field ocm51855599
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 030306s2003 miu b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2003045990
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency IOJ
-- OCLCQ
-- BAKER
-- JYJ
-- IG#
-- BTCTA
-- YDXCP
-- BDX
019 ## -
-- 51628221
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0780806484
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780780806481
029 1# - (OCLC)
OCLC library identifier IG#
System control number 0780806484
029 1# - (OCLC)
OCLC library identifier YDXCP
System control number 1867627
029 1# - (OCLC)
OCLC library identifier NZ1
System control number 7574220
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000024500151
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)51855599
Canceled/invalid control number (OCoLC)51628221
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number C658 2003
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 21
049 ## - LOCAL HOLDINGS (OCLC)
Holding library TEXA
245 00 - TITLE STATEMENT
Title Computer security sourcebook /
Statement of responsibility, etc edited by Wilma R. Caldwell.
250 ## - EDITION STATEMENT
Edition statement 1st ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Detroit, MI :
Name of publisher, distributor, etc Omnigraphics,
Date of publication, distribution, etc c2003.
300 ## - PHYSICAL DESCRIPTION
Extent xiv, 514 p. ;
Dimensions 24 cm.
490 1# - SERIES STATEMENT
Series statement Security reference series
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Basic principles of computer security. Seven simple computer security tips for small business and home computer users -- Computer system security : let's get personal --Computer hardware hardware security. Security of hard drives -- Theft of laptops -- Insecure modems -- Choosing a medium for backup data storage -- Software-related threats to computer security. How computer viruses work -- The threat of internet worms -- Personal digital assistant (PDA) viruses : nothing to worry about? -- Dangerous downloads : entertainment programs may switch your internet connection -- Beware of modem dialer software which calls overseas without your OK -- E-mail pitfalls : viruses, forged messages, and privacy concerns -- Web bugs : frequently asked questions and privacy issues -- Avoiding software design flaw-related threats -- Next generation virtual private networks : promises hard to keep, forecasts hard to meet -- How software can allow hackers access to your computer -- Preventing damage from software-related threats and hackers. The internet : business blessing or terrorist tool? -- Cyberterrorism (information warfare) : risks and prevention -- Hacking and cracking take on new National Security implications -- Stop hackers by avoiding these common mistakes -- Avoiding weak passwords, selecting good ones -- Trust but verify : a guide to securing computers from malicious codes in e-mail -- Personal firewalls : one more step toward comprehensive security -- Children's online safety. Children's privacy and safety on the internet -- How to protect kid's privacy online -- Protecting your child from online predators -- Children's Internet Protection Act -- Banking and financial security issues. E-commerce and you : online shopping tips -- A consumer's guide to e-payments : keeping your transactions safe and secure -- Protecting financial privacy in the new millennium : the burden is on you -- Choosing a company that will protect your financial privacy -- Understanding privacy policies -- Consumer credit file privacy : the real deal -- An overview of internet fraud for the consumer -- Anti-fraud systems : a necessity for e-retailers -- Online investment opportunities : avoiding fraudulent promoters and sites -- How facial recognition systems work -- Biometrics : ready for information technology prime time -- Smartcards : how soon is now? -- Other personal privacy issues online. Intellectual property and the National Information Infrastructure -- Unsolicited e-mail : information about hoaxes, urban legends, chain letters, and warnings -- Unsolicited e-mail : information about e-mail chain scams and give-away hoaxes -- Unsolicited e-mail : junk e-mail, bulk e-mail, and other spam -- Pretexting : your personal information revealed -- Technology spurs rise in identity theft -- The U.S. Attorney General's report on cyberstalking --
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Information about encryption and cryptography. Encrypted Communication Privacy Act summary -- Free and inexpensive security software for encryption -- Pretty Good Privacy (PGP) overview -- Digital signatures : what can businesses and consumers expect? -- Why cryptography is harder than it looks -- Steganography (information hiding) : definition and history -- Government, workplace, and commercial online surveillance. Software snags crooks, sneaking spouses, but alarms privacy advocates -- The trouble with spyware and advertising-supported software -- How Carnivore works -- Frequently asked questions (FAQ) about ECHELON -- Total Information Awareness (TIA) : the Pentagon's new surveillance initiative -- How internet cookies work -- Data mining : an introduction to how businesses use the data they collect -- The USA Patriot Act : new authorities relating to computer crime and electronic evidence -- Employee monitoring : is there privacy in the workplace? -- Additional help and information. Resources for software bugs, security holes, and program patches -- Computer security software programs and resources -- Publications devoted to online computer security -- Public and private computer security and privacy organizations -- Government computer security resource agencies -- Anti-spam resources -- Privacy options resources.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Caldwell, Wilma.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Online version:
Title Computer security sourcebook.
Edition 1st ed.
Place, publisher, and date of publication Detroit, MI : Omnigraphics, c2003
Record control number (OCoLC)682880041
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Security reference series.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Book
Holdings
Withdrawn status Lost item Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Date checked out Cost, replacement price Price effective from Koha item type
          Longview campus Longview campus Stacks - 3rd Floor 03/19/2004 54.40 1 QA76.9.A25 C658 2003 0000001647163 10/30/2009 10/30/2009 54.40 08/10/2011 Book