MARC details
000 -LEADER |
fixed length control field |
02243cam a22002897i 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
150615s2016 mau b 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781284090550 (pbk. : alk. paper) |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
302.30285 HAR |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Harwood, Mike. |
240 10 - UNIFORM TITLE |
Uniform title |
<a href="Security Strategies in Web applications and social networking.">Security Strategies in Web applications and social networking.</a> |
245 10 - TITLE STATEMENT |
Title |
Internet Security : |
Remainder of title |
How to Defend Against Attackers on the Web |
250 ## - EDITION STATEMENT |
Edition statement |
2nd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Burlington: |
Name of publisher, distributor, etc |
Jones & Bartlett Learning; |
Date of publication, distribution, etc |
2016 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xvii, 438 pages ; |
Dimensions |
24 cm |
365 ## - TRADE PRICE |
Price amount |
$ 65.00 |
490 0# - SERIES STATEMENT |
Series statement |
Jones & bartlett learning, information systems security & assurance series |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references (pages 415-422) and index. |
505 0# - |
General note |
From mainframe to client-server to world wide web -- Security considerations for smb's -- Security considerations for home and personal online use -- Securing mobile communications -- Mitigating risk when connecting to the internet -- Mitigating web site risks, threats, and vulnerabilities -- Introducing the web application security consortium (WASC) -- Securing web applications -- Mitigating web application vulnerabilities -- Maintaining pci dss compliance for e-commerce web sites -- Testing and quality assurance for production web sites -- Performing a web site vulnerability and security assessment -- Securing end-point device communications -- Securing personal and business communications -- Web application security organizations, education, training, and certification. |
520 ## - SUMMARY, ETC. |
Summary, etc |
"Internet Security: How to Defend Against Attackers on the Web, Second Edition provides a comprehensive explanation of the evolutionary changes that have occurred in computing, communications, and social networking and discusses how to secure systems against all the risks, threats, and vulnerabilities associated with Web-enabled applications accessible via the internet"-- |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Online social networks |
General subdivision |
Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Application software |
General subdivision |
Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Internet and Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
World Wide Web |
General subdivision |
Security measures. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Harwood, Mike. |
Title of a work |
Security strategies in Web applications and social networking. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Item type |
Reference Books |