Internet Security : (Record no. 117625)

MARC details
000 -LEADER
fixed length control field 02243cam a22002897i 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 150615s2016 mau b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781284090550 (pbk. : alk. paper)
042 ## - AUTHENTICATION CODE
Authentication code pcc
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 302.30285 HAR
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Harwood, Mike.
240 10 - UNIFORM TITLE
Uniform title <a href="Security Strategies in Web applications and social networking.">Security Strategies in Web applications and social networking.</a>
245 10 - TITLE STATEMENT
Title Internet Security :
Remainder of title How to Defend Against Attackers on the Web
250 ## - EDITION STATEMENT
Edition statement 2nd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Burlington:
Name of publisher, distributor, etc Jones & Bartlett Learning;
Date of publication, distribution, etc 2016
300 ## - PHYSICAL DESCRIPTION
Extent xvii, 438 pages ;
Dimensions 24 cm
365 ## - TRADE PRICE
Price amount $ 65.00
490 0# - SERIES STATEMENT
Series statement Jones & bartlett learning, information systems security & assurance series
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references (pages 415-422) and index.
505 0# -
General note From mainframe to client-server to world wide web -- Security considerations for smb's -- Security considerations for home and personal online use -- Securing mobile communications -- Mitigating risk when connecting to the internet -- Mitigating web site risks, threats, and vulnerabilities -- Introducing the web application security consortium (WASC) -- Securing web applications -- Mitigating web application vulnerabilities -- Maintaining pci dss compliance for e-commerce web sites -- Testing and quality assurance for production web sites -- Performing a web site vulnerability and security assessment -- Securing end-point device communications -- Securing personal and business communications -- Web application security organizations, education, training, and certification.
520 ## - SUMMARY, ETC.
Summary, etc "Internet Security: How to Defend Against Attackers on the Web, Second Edition provides a comprehensive explanation of the evolutionary changes that have occurred in computing, communications, and social networking and discusses how to secure systems against all the risks, threats, and vulnerabilities associated with Web-enabled applications accessible via the internet"--
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Online social networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Application software
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Internet and Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element World Wide Web
General subdivision Security measures.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Harwood, Mike.
Title of a work Security strategies in Web applications and social networking.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Item type Reference Books
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Total Checkouts Full call number Barcode Date last seen Date last borrowed Koha item type
  Dewey Decimal Classification   Not For Loan Arun Jaitley National Institute of Financial Management Arun Jaitley National Institute of Financial Management 26/09/2019 3 302.30285 HAR 36836 17/01/2024 28/11/2023 Reference Books

Copyrights © AJNIFM Faridabad 2022. All Right Reserved

Web Counter