Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
1141 results found. Sorted by relevance | date | title .
E-Books/E-Docs

Title Computer security handbook / edited by Seymour Bosworth, Michel E. Kabay, Eric Whyne.

Publication Info. Hoboken, New Jersey : Wiley, [2014]

Copies

Location Call No. OPAC Message Status
 Axe Books 24x7 IT E-Book  Electronic Book    ---  Available
Edition Sixth edition.
Description 1 online resource (2 volumes)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Bibliography Includes bibliographical references and index.
Note Online resource; title from digital title page (viewed on April 24, 2014).
Contents COMPUTER SECURITY HANDBOOK (Volume 1); CONTENTS; PREFACE; ACKNOWLEDGMENTS; ABOUT THE EDITORS; ABOUT THE CONTRIBUTORS; A NOTE TO THE INSTRUCTOR; INTRODUCTION TO PART I: FOUNDATIONS OF COMPUTER SECURITY; CHAPTER 1 BRIEF HISTORY AND MISSION OF INFORMATION SYSTEM SECURITY; 1.1 INTRODUCTION TO INFORMATION SYSTEM SECURITY; 1.2 EVOLUTION OF INFORMATION SYSTEMS; 1.2.1 1950s: Punched-Card Systems; 1.2.2 Large-Scale Computers; 1.2.3 Medium-Size Computers; 1.2.4 1960s: Small-Scale Computers; 1.2.5 Transistors and Core Memory; 1.2.6 Time Sharing; 1.2.7 Real-Time, Online Systems.
1.2.8 A Family of Computers1.2.9 1970s: Microprocessors; 1.2.10 The First Personal Computers; 1.2.11 The First Network; 1.2.12 Further Security Considerations; 1.2.13 The First "Worm"; 1.2.14 1980s: Productivity Enhancements; 1.2.15 1980s: The Personal Computer; 1.2.16 Local Area Networks; 1.2.17 1990s: Interconnection; 1.2.18 1990s: Total Interconnection; 1.2.19 Telecommuting; 1.2.20 Internet and the World Wide Web; 1.2.21 Virtualization and the Cloud; 1.2.22 Supervisory Control and Data Acquisition; 1.3 GOVERNMENT RECOGNITION OF INFORMATION ASSURANCE; 1.3.1 IA Standards.
1.3.2 Computers at Risk1.3.3 InfraGard; 1.4 RECENT DEVELOPMENTS; 1.5 ONGOING MISSION FOR INFORMATION SYSTEM SECURITY; 1.6 NOTES; CHAPTER 2 HISTORY OF COMPUTER CRIME; 2.1 WHY STUDY HISTORICAL RECORDS?; 2.2 OVERVIEW; 2.3 1960S AND 1970S: SABOTAGE; 2.3.1 Direct Damage to Computer Centers; 2.3.2 1970-1972: Albert the Saboteur; 2.4 IMPERSONATION; 2.4.1 1970: Jerry Neal Schneider; 2.4.2 1980-2003: Kevin Mitnick; 2.4.3 Credit Card Fraud; 2.4.4 Identity Theft Rises; 2.5 PHONE PHREAKING; 2.5.1 2600 Hz; 2.5.2 1982-1991: Kevin Poulsen; 2.6 DATA DIDDLING; 2.6.1 Equity Funding Fraud (1964-1973).
2.6.2 1994: Vladimir Levin and the Citibank Heist2.7 SALAMI FRAUD; 2.8 LOGIC BOMBS; 2.9 EXTORTION; 2.10 TROJAN HORSES; 2.10.1 1988 Flu-Shot Hoax; 2.10.2 Scrambler, 12-Tricks, and PC Cyborg; 2.10.3 1994: Datacomp Hardware Trojan; 2.10.4 Keylogger Trojans; 2.10.5 Haephrati Trojan; 2.10.6 Hardware Trojans and Information Warfare; 2.11 NOTORIOUS WORMS AND VIRUSES; 2.11.1 1970-1990: Early Malware Outbreaks; 2.11.2 December 1987: Christmas Tree Worm; 2.11.3 November 2, 1988: Morris Worm; 2.11.4 Malware in the 1990s; 2.11.5 March 1999: Melissa; 2.11.6 May 2000: I Love You; 2.11.7 July 2010 Stuxnet.
2.12 SPAM 22.12.1 1994: Green Card Lottery Spam; 2.12.2 Spam Goes Global; 2.13 DENIAL OF SERVICE; 2.13.1 1996: Unamailer; 2.13.2 2000: MafiaBoy; 2.14 HACKER UNDERGROUND; 2.14.1 1981: Chaos Computer Club; 2.14.2 1982: The 414s; 2.14.3 1984: Cult of the Dead Cow; 2.14.4 1984: 2600: The Hacker Quarterly; 2.14.5 1984: Legion of Doom; 2.14.6 1985: Phrack; 2.14.7 1989: Masters of Deception; 2.14.8 1990: Operation Sundevil; 2.14.9 1990: Steve Jackson Games; 2.14.10 1992: L0pht Heavy Industries; 2.14.11 2004: Shadowcrew; 2.14.12 Late 2000s: Russian Business Network (RBN); 2.14.13 Anonymous.
Summary Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written for professionals and college students, it provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more. This essential and highly-regarded r.
Subject Electronic data processing departments -- Security measures.
BUSINESS & ECONOMICS -- Industrial Management.
BUSINESS & ECONOMICS -- Management.
BUSINESS & ECONOMICS -- Management Science.
BUSINESS & ECONOMICS -- Organizational Behavior.
Electronic data processing departments -- Security measures. (OCoLC)fst00907090
Genre/Form Electronic books.
Added Author Bosworth, Seymour, editor.
Kabay, Michel E., editor.
Whyne, Eric, 1981- editor.
Other Form: Print version: Computer security handbook. Sixth edition. Hoboken, New Jersey : John Wiley & Sons, Inc., [2014] 9781118134108 (DLC) 2013041083 (OCoLC)858361127
ISBN 9781118851791 (electronic bk.)
111885179X (electronic bk.)
9781118851746 (electronic bk.)
1118851749 (electronic bk.)
9781118851678 (electronic bk.)
1118851676 (electronic bk.)
1118134109 (vol. 1 ; pbk.)
9781118134108 (vol. 1 ; pbk.)
1118134117 (vol. 2 ; pbk.)
9781118134115 (vol. 2 ; pbk.)
1118127064 (2 volume set ; pbk.)
9781118127063 (2 volume set ; pbk.)
9781118851722 (pdf)
1118851722 (pdf)
Standard No. AU@ 000052169937
AU@ 000052901623
AU@ 000053310544
CHNEW 000942486
CHVBK 480227756
DEBBG BV043396316
DEBBG BV044067374
DEBSZ 431653348
DEBSZ 468874127
GBVCP 780908694

 
    
Available items only