Southville International School and Colleges

Cyber warfare : (Record no. 22355)

000 -LEADER
fixed length control field 01819nam a2200229 a 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140310183403.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 121010s19uu xx 00 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781597496377
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number U 163
Item number .An64 2011
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Andress, Jason
245 ## - TITLE STATEMENT
Title Cyber warfare :
Remainder of title techniques, tactics and tools for security practitioners /
Statement of responsibility, etc Jason Andress, Steve Winterfeld ; Russ Rogers, technical editor ; foreword by Stephen Northcutt.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Amsterdam ; Boston :
Name of publisher, distributor, etc Syngress / Elsevier,
Date of publication, distribution, etc 2011.
300 ## - PHYSICAL DESCRIPTION
Extent xxvii, 289 p. :
Other physical details ill. ;
Dimensions 25 cm.
500 ## - GENERAL NOTE
General note Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc Overview: Cyber Warfare explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors-our defenses must be ready all the time and our alert systems must detect the threats every time. Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks; Dives deeply into relevant technical and factual information from an insider's point of view; Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information warfare
General subdivision Handbooks, manuals, etc
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures
-- Handbooks, manuals, etc
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Winterfeld, Steve
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Rogers, Russ
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
Source of classification or shelving scheme
Call number prefix Foreign
Holdings
Source of acquisition Damaged status Koha item type Withdrawn status Full call number Shelving location Price effective from Date acquired Lost status Barcode Source of classification or shelving scheme Permanent Location Date last seen Current Location
Donation Books U 163 .An64 2011Graduate Section2014-03-102012-10-10 C16301 College Library2018-05-15College Library
Powered by Koha