Principles and practice of information security: protecting computers from hackers and lawyers
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Upper Saddle River, NJ
Pearson/Prentice Hall
2004
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XXI, 232 S. Ill. |
ISBN: | 0131840274 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV017410629 | ||
003 | DE-604 | ||
005 | 20040707 | ||
007 | t | ||
008 | 030812s2004 xxua||| |||| 00||| eng d | ||
010 | |a 2003058165 | ||
020 | |a 0131840274 |c pbk. |9 0-13-184027-4 | ||
035 | |a (OCoLC)52798933 | ||
035 | |a (DE-599)BVBBV017410629 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-703 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
100 | 1 | |a Volonino, Linda |e Verfasser |4 aut | |
245 | 1 | 0 | |a Principles and practice of information security |b protecting computers from hackers and lawyers |c Linda Volonino, Stephen R. Robinson with contributions by Charles P. Volonino |
264 | 1 | |a Upper Saddle River, NJ |b Pearson/Prentice Hall |c 2004 | |
300 | |a XXI, 232 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Internet |x Security measures | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Robinson, Stephen R. |e Sonstige |4 oth | |
700 | 1 | |a Volonino, Charles P. |e Sonstige |4 oth | |
856 | 4 | 2 | |m HEBIS Datenaustausch Darmstadt |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010490237&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-010490237 |
Datensatz im Suchindex
_version_ | 1804130226933858304 |
---|---|
adam_text | PRINCIPLES AND PRACTICE OF INFORMATION SECURITY PROTECTING COMPUTERS
FROM HACKERS AND LAWYERS LINDA VOLONINO, PH.D. CANISIUS COLLEGE STEPHEN
R. ROBINSON VERITY PARTNERS, LLC WITH CONTRIBUTIONS BY CHARLES P.
VOLONINO ULB DARMSTADT 16238007 UPPER SADDLE RIVER, NEW JERSEY 07458
CONTENTS PREFACE XV PART I: DIGITAL LIABILITIES AND RISK MANAGEMENT
CHAPTER 1 SECURITY IN A GLOBALLY CONNECTED ECONOMY 1 INTRODUCTION 1 WHAT
IS INFORMATION SECURITY? 1 DEFINITION 1 SECURITY GOALS 1 APPLYING
CONVENTIONAL PRINCIPLES TO THE CYBER WORLD 3 THE DIGITAL LIABILITY
MANAGEMENT (DLM) MODEL 3 THE PRINCIPLES OF SECURITY 4 SECURITY IS
COMPLEX 4 SECURITY IS DIFFICULT TO COST-JUSTIFY, BUT NOT IMPOSSIBLE 6
SECURITY IN THE INFORMATION ECONOMY 6 GLOBAL ECONOMY IN TRANSITION 6
LEGAL LIABILITY ISSUES 6 GUIDE TO THE RISKS INHERENT TO CONDUCTING
BUSINESS IN A NETWORKED ECONOMY 6 MISTAKES, MALICE, AND MISCHIEF
INCREASE LIABILITY*AND LEGISLATION 7 ELECTRONIC EVIDENCE 7 THREATS TO
INFORMATION SECURITY 7 EXTENDED LEGISLATION AND RESPONSIBILITIES 8
LIABILITY ISSUES AND REGULATORY OBLIGATIONS 8 ELECTRONIC RECORDS
RETENTION 9 INTERNATIONAL ORGANIZATIONS 10 DO] DEFINES COMPUTER CRIME 10
CONGRESS EXPANDS COMPUTER CRIME LEGISLATION AND AUTHORITY 10 NEW ETHIC
OF RESPONSIBILITY 11 CHAPTER SUMMARY 12 KEY TERMS 12 DISCUSSION
QUESTIONS 12 ENDNOTES 13 CHAPTER 2 SOURCES OF DIGITAL LIABILITY 14
INTRODUCTION 14 ASSESSING AND PROTECTING DIGITAL ASSETS 14 RISK
ASSESSMENT 14 INSUFFICIENT PROTECTION AGAINST AVOIDABLE LOSSES 17 VII
VIII CONTENTS DIGITAL LIABILITY MANAGEMENT 17 ACTIVITIES THAT CAUSE
DIGITAL LIABILITY 18 DIGITAL LIABILITY: POST-1999 19 DAMAGE ESTIMATIONS
20 COMMON SOURCES OF RISK 20 USER IGNORANCE 20 LACK OF ENFORCEABLE
POLICY 21 SOCIAL ENGINEERING 21 EXCESSIVE SHARING 22 REVEALING CANDOR 23
FACTORS EXACERBATING DIGITAL LIABILITY 23 INTRACTABLE PROBLEMS 24
LAGGING PRACTICES 24 BUSINESS AND LEGAL REASONS FOR CONCERN 24 BECAUSE
OF ZERO-TOLERANCE ENVIRONMENTS 24 BECAUSE THE COMPANY S WELL-BEING IS AT
STAKE 25 BECAUSE OF PRIVILEGED INFORMATION 27 TESTS OF NEGLIGENCE 27
CHAPTER SUMMARY 28 KEY TERMS 29 DISCUSSION QUESTIONS 29 ENDNOTES 30
CHAPTER 3 THREATS, VULNERABILITIES, AND RISK EXPOSURE 31 INTRODUCTION 31
CLASSIFICATION OF COMPUTER THREATS AND VULNERABILITIES 34 USES OF THE
TTV 34 TAXONOMY OF THREATS AND VULNERABILITIES 35 ORIGIN OF THE
INTRUSION OR THREAT 37 EXTERNAL THREATS AND VULNERABILITIES 37 INTERNAL
THREATS AND VULNERABILITIES 41 WIRELESS THREATS AND VULNERABILITIES 44
EXTERNAL THREATS WITH INTERNAL INTERVENTION 44 INTERNAL PROTOCOL
VULNERABILITIES AND THREATS 45 SUCCESS OF HACKERS AND MALWARE 47
INTRUDERS EXPAND THEIR OPTIONS 47 COMPLEXITY OF SOFTWARE AND
CONFIGURATIONS 47 WHY HACK ATTACKS SUCCEED SO OFTEN 47 THREATS,
VULNERABILITIES, AND FIRST-PARTY AND THIRD-PARTY RISKS 48 FIRST-PARTY
RISKS 48 THIRD-PARTY RISKS 48 FIRST- AND THIRD-PARTY DAMAGES 49 CHAPTER
SUMMARY 49 KEY TERMS 50 DISCUSSION QUESTIONS 50 ENDNOTES 51 CONTENTS IX
CHAPTER 4 AN AFFIRMATIVE MODEL OF DEFENSE: DIGITAL LIABILITY MANAGEMENT
52 INTRODUCTION 52 THE INFORMATION SECURITY CHALLENGE IS NOT BEING MET
52 THE IMPORTANCE OF EXECUTION 53 HALLMARKS OF PROPER EXECUTION 54 THE
RISK AND REWARD OF NEW INITIATIVES 54 HIGHER STANDARDS OF SECURITY 55
WHY IS INFORMATION SECURITY POORLY EXECUTED? 55 THE DLM DEFENSE MODEL 56
THE DLM MODEL 56 TIER 1: SENIOR MANAGEMENT COMMITMENT AND SUPPORT 56
SECURITY AWARENESS BEGINS AND ENDS IN THE BOARDROOM 57 OVERCOMING
OBJECTIONS AND ADVERSARIES 58 TIER 2: ACCEPTABLE-USE POLICIES AND OTHER
STATEMENTS OF PRACTICE 59 AUPS DEFINE ACCEPTABLE AND UNACCEPTABLE
BEHAVIOR 59 STAKEHOLDERS INVOLVED IN AUPS 59 AUPS DEFINE EXPECTATIONS
AND DEMONSTRATE DUE DILIGENCE 60 EVERYONE MUST PRACTICE INFORMATION
SECURITY 60 MAINTENANCE IS IMPORTANT 60 TIER 3: SECURE-USE PROCEDURES 60
TIER 4: HARDWARE, SOFTWARE, AND NETWORK SECURITY TOOLS 61 CHAPTER
SUMMARY 61 KEY TERMS 62 DISCUSSION QUESTIONS 62 ENDNOTES 62 CHAPTER 5
MODELS FOR ESTIMATING RISK AND OPTIMIZING THE RETURN ON SECURITY
INVESTMENT 63 INTRODUCTION 63 THE IMPORTANCE OF RISK ASSESSMENT 63
GETTING MANAGEMENT S ATTENTION 63 RISK ASSESSMENT: A BASIC REQUIREMENT
OF ISO 17799 65 RAISING THE STATUS OF INFORMATION SECURITY BUDGETS 65
ASSESSING THE EXPECTED (AVERAGE) COST OF A LOSS 65 RISK ASSESSMENT CUBE
66 EXPECTED LOSS VALUE ESTIMATIONS 67 EXPECTED LOSS COMPUTATION 67
MARGINAL COST * BENEFIT ANALYSIS * AN APPLICATION OF EXPECTED VALUE 68
BALANCING EXPECTED LOSS WITH THE COST OF SECURITY DEFENSES 69 CHALLENGES
IN ESTIMATING LOSS OF DIGITAL ASSETS 69 INTANGIBLE ASSETS 69 REPLICATION
INCREASES EXPOSURE AND PROBABILITY OF A LOSS 70 OUTSOURCING PLACES DATA
AND DOCUMENTS OUT OF CONTROL 71 X CONTENTS KNOWLEDGE ASSETS ARE
DIFFICULT TO REPLACE 71 MISSION-CRITICAL SOFTWARE APPLICATIONS 72 DENIAL
OF SERVICE RISK 72 VALUATION OF DIGITAL ASSETS AND RISK 73 SOFTWARE
ASSETS 73 KNOWLEDGE ASSETS 73 GOODWILL 74 SOURCES OF INFORMATION FOR
RISK ESTIMATIONS 74 RESEARCH AND CONSULTING FIRMS 74 TECHNICAL TOOLS 74
BUSINESS PARTNERS AND INDUSTRY GROUPS 74 OVERALL RISK EVALUATION PROFILE
75 ASSESS THE CURRENT SITUATION 75 POLICY AND PROCESS PERSPECTIVE 76
ORGANIZATIONAL PERSPECTIVE 76 TECHNOLOGY PERSPECTIVE 77 AUDITS WITH
TRADING PARTNERS AND CUSTOMERS 77 CHAPTER SUMMARY 77 KEY TERMS 78
DISCUSSION QUESTIONS 78 ENDNOTES 79 PART II: POLICIES, PRACTICES, AND
DEFENSIVE TECHNOLOGY 80 CHAPTER 6 ACCEPTABLE-USE POLICIES: HUMAN
DEFENSES 80 INTRODUCTION 80 MCIWORLDCOM S AUP LEADS TO EARLY DISMISSAL
OF LAWSUIT 81 THE AUP: THE DISCIPLINE AND DILIGENCE DEFENSE TIER 83 DUAL
FUNCTIONS OF THE AUP 83 SECURITY BREACH PREVENTION 83 LEGAL PROTECTION
84 LEGAL THEORIES AND EMPLOYER LIABILITY ISSUES 84 RESPONDEAT SUPERIOR
DOCTRINE AND LIABILITY 85 NEGLIGENT SUPERVISION AND DUTY OF CARE 85
CHARACTERISTICS OF EFFECTIVE AUPS 86 COMPREHENSIVE SCOPE 86 CLEAR
LANGUAGE 86 ADAPTIVE CONTENT 86 EXTENSION TO OTHER COMPANY POLICIES 86
ENFORCEMENT PROVISIONS 86 CONSENT 86 ACCOUNTABILITY 87 AUP TEMPLATE 87
CONTENTS XI SAMPLE ACCEPTABLE-USE POLICY (AUP) 87 PURPOSE AND SCOPE 87
AUP GUIDELINES 88 PROVISIONS AND PROHIBITIONS 88 COMPLIANCE 89 CHAPTER
SUMMARY 91 KEY TERMS 92 DISCUSSION QUESTIONS 92 ENDNOTES 93 CHAPTER 7
SECURE-USE PRACTICES: DEFENSIVE BEST PRACTICES 94 INTRODUCTION 94 SECURE
USE PRACTICES: POLICIES 94 MAJOR RISK FACTORS 94 LIMITS ON THE EXTENT TO
WHICH RISK FACTORS CAN BE CONTROLLED 96 ENFORCEMENT OF SECURE-USE
PRACTICES MUST BE CONSISTENT WITH THE AUP 96 KEY SECURE-USE PROCEDURES
AND PRACTICES 97 INTRODUCING A SECURITY FOCUS IN THE ORGANIZATIONAL
PLANNING PROCESS 97 ESTABLISHING SECURITY AS A BUSINESS FUNCTION 97
INTEGRATING SECURITY AND BUSINESS PLANS 97 DEPLOYING INFORMATION
SECURITY STANDARDS 98 DOCUMENTATION AND TRAINING 99 INCIDENT RESPONSE
POLICY AND INCIDENT RESPONSE TEAMS 99 DEVELOPING A NOTIFICATION PLAN 100
SECURE-USE PROCEDURES: TECHNOLOGY 100 SHUT DOWN UNNECESSARY SERVICES 101
SET UP AND MAINTAIN PERMISSIONS SECURELY 101 CONDUCT BACKGROUND CHECKS
102 ENFORCE STRONG PASSWORDS 102 REVIEW PARTNER CONTRACTS 102 AUDIT AND
UPDATE 103 PHYSICAL SECURITY 103 AUDIT AND TEST 105 OTHER SECURE
PRINCIPLES AND PRACTICES 105 INSURANCE 105 STAYING CURRENT 106
REINFORCING SECURE-USE PROCEDURES 106 REWARDING SECURE BEHAVIOR 106
WORST PRACTICES 107 DANGEROUS EMAIL PRACTICES 107 DANGEROUS SHARING
PRACTICES 107 CHAPTER SUMMARY 109 KEY TERMS 109 XII CONTENTS DISCUSSION
QUESTIONS 109 ENDNOTES 109 CHAPTER 8 TECHNOLOGY AND AUDITING SYSTEMS:
HARDWARE AND SOFTWARE DEFENSES 111 INTRODUCTION 111 FACTORS DRIVING THE
NEED FOR DIVERSE TECHNOLOGY LAYERS 113 GROWTH IN COMPUTER CRIME 113
GROWTH IN SOFTWARE COMPLEXITY AND FLAWS 113 GROWTH IN THE RELEASE RATE
OF SECURITY PATCHES AND SERVICE PACKS 114 SECURITY TECHNOLOGY 115 NO
OUT-OF-THE-BOX SOLUTIONS 115 TOOLS AND TARGETS 115 MULTILAYERED,
DIVERSE TECHNOLOGY INFRASTRUCTURE 115 CHARACTERISTICS OF A DEFENSIVE
TECHNOLOGY INFRASTRUCTURE 116 UNDERLYING TECHNICAL ISSUES 117 FUNCTIONAL
REQUIREMENTS OF HARDWARE AND SOFTWARE 117 TCP/IP 117 PORTS 118 FILE
INTEGRITY CHECKER 118 ROUTERS 118 PERIMETER AND FILE PROTECTION 119
MAINTAINING CONFIDENTIALITY AND INTEGRITY 119 FIREWALLS 119 STATEFUL
INSPECTION FIREWALLS 121 PROXY SERVER FIREWALLS 121 MULTIPLE-DEFENSE
FIREWALLS 121 DMZ 121 PERSONAL FIREWALLS 121 WHAT FIREWALLS CANNOT
DEFEND AGAINST 123 PORT SCANNING AND SCANNERS 123 INTRUSION DETECTION
SYSTEMS (IDS) 124 HONEYPOTS 126 CRYPTOGRAPHY AND ENCRYPTION KEYS 127
PUBLIC KEY INFRASTRUCTURE (PKI) 128 VIRTUAL PRIVATE NETWORKS (VPNS) 129
ACCESS CONTROL: TOKENS AND BIOMETRICS 132 ANTIVIRUS (AV) SOFTWARE 132
TECHNOLOGY FOR ENFORCING POLICY 133 EMAIL AND INSTANT MESSAGING (IM)
FILTERS 133 CONTENT MONITORS 134 SNIFFERS AND SCANNERS 134 CHAPTER
SUMMARY 135 KEY TERMS 135 DISCUSSION QUESTIONS 135 ENDNOTES 136 CONTENTS
XIII PART III: COMPUTER FORENSICS, ELECTRONIC EVIDENCE, FRAUD, AND
COMPUTER CRIME LAWS 137 CHAPTER 9 ELECTRONIC EVIDENCE, ELECTRONIC
RECORDS MANAGEMENT, AND COMPUTER FORENSICS 137 INTRODUCTION 137
ELECTRONIC EVIDENCE 138 DISCOVERY OF ELECTRONIC BUSINESS RECORDS FOR USE
AS EVIDENCE 139 CONSEQUENCES OF FAILING TO COMPLY WITH DISCOVERY
REQUESTS 139 PRESERVING AND DISCLOSING E-EVIDENCE 141 FEDERAL RULES OF
CIVIL PROCEDURE* THE RULES 143 RULE 34 AMENDED TO INCLUDE ELECTRONIC
RECORDS 143 UNSETTLED LEGAL ISSUES ADD COMPLEXITY AND RISK 143 OTHER
LEGAL ISSUES WITH SIGNIFICANT CONSEQUENCES 144 ELECTRONIC RECORDS
MANAGEMENT (ERM) 144 SARBANES-OXLEY ACT OF 2002 145 ERM GUIDE FOR
EMPLOYEES 145 ERM AND AUP 146 COMPUTER FORENSICS 146 WHAT CAN BE
REVEALED 147 WHAT CAN BE RECOVERED 147 HANDLING E-EVIDENCE: THE 3 C S
147 ELIMINATING ELECTRONIC RECORDS 148 HIGH-PROFILE LEGAL CASES 149
CHAPTER SUMMARY 150 KEY TERMS 150 DISCUSSION QUESTIONS 150 ENDNOTES 151
CHAPTER 10 COMPUTER CRIME, COMPUTER FRAUD, AND CYBER TERRORISM 153
INTRODUCTION 153 U.S. FEDERAL STATUTES DEFINING COMPUTER CRIME, FRAUD,
AND TERRORISM 154 NEW AND AMENDED LAWS ADDRESS INTERNET CRIMES 154 THE
COMPUTER FRAUD AND ABUSE ACT AND OTHER STATUTES 155 KEY COMPUTER FRAUD
AND ABUSE TERMS DEFINED 155 THE COMPUTER AS THE TARGET OF A CRIME:
CRIMES AGAINST A COMPUTER 157 THE COMPUTER AS THE INSTRUMENT OF A CRIME:
CRIMES USING A COMPUTER 159 COMPUTER FRAUD 161 DEFINING THE PROBLEM 161
FACTORS CONTRIBUTING TO COMPUTER FRAUD 161 THE NATURE OF FRAUD * AND ITS
WARNING SIGNS 161 ECONOMIC FRAUD AND WHITE-COLLAR CRIME 162 THEORIES AND
PRINCIPLES OF PUNISHMENT FOR WHITE-COLLAR CRIMES 162 THE PROSECUTION AND
COSTS OFWHITE-COLLAR CRIME 162 MONEY LAUNDERING 163 XIV CONTENTS
COMPUTER FORENSICS TECHNIQUES FOR CATCHING CYBER CRIMINALS 164
DOCUMENTATION OF INCIDENTS AND INCIDENT HANDLING 165 FINDING E-EVIDENCE
OF AN INTRUSION OR ATTACK 169 TRACKING DOWN CYBER CRIMINALS 169 CYBER
TERRORISM 170 THE NATIONAL STRATEGY TO SECURE CYBERSPACE 170 DIGITAL
PEARL HARBOR SIMULATION 170 THE FREEDOM CYBER FORCE MILITIA HIJACKS
AL-JAZEERA S WEBSITES 171 CHAPTER SUMMARY 172 KEY TERMS 173 DISCUSSION
QUESTIONS 173 ENDNOTES 173 APPENDIX TO PART III: USA PATRIOT ACT 175
PART IV: PRIVACY 177 CHAPTER 11 PRIVACY AND DATA PROTECTION 177
INTRODUCTION 177 SPAM 177 REASONS FOR THE INCREASE IN SPAM 177 THE
ECONOMIC IMPACT OF SPAM 178 SPAM DEFENSES 179 PRIVACY 180
CHARACTERISTICS OF SECURITY 180 LEAVING A DIGITAL TRAIL 181 METHODS OF
INFORMATION COLLECTION 181 INTERNATIONAL PRIVACY LAW 183 OECD PRIVACY
GUIDELINES 184 COMPLIANCE INITIATIVES 185 CHAPTER SUMMARY 186 KEY TERMS
186 DISCUSSION QUESTIONS 187 ENDNOTES 187 APPENDIX TO PART IV: HIPAA
APPENDIX AND GLOSSARY 188 GLOSSARY 192 ABBREVIATIONS AND ACRONYMS 211
REFERENCES 214 ONLINE REFERENCES 221 INDEX 224
|
any_adam_object | 1 |
author | Volonino, Linda |
author_facet | Volonino, Linda |
author_role | aut |
author_sort | Volonino, Linda |
author_variant | l v lv |
building | Verbundindex |
bvnumber | BV017410629 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 273 |
ctrlnum | (OCoLC)52798933 (DE-599)BVBBV017410629 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01746nam a2200445zc 4500</leader><controlfield tag="001">BV017410629</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20040707 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">030812s2004 xxua||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2003058165</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0131840274</subfield><subfield code="c">pbk.</subfield><subfield code="9">0-13-184027-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)52798933</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV017410629</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Volonino, Linda</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Principles and practice of information security</subfield><subfield code="b">protecting computers from hackers and lawyers</subfield><subfield code="c">Linda Volonino, Stephen R. Robinson with contributions by Charles P. Volonino</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Upper Saddle River, NJ</subfield><subfield code="b">Pearson/Prentice Hall</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXI, 232 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Robinson, Stephen R.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Volonino, Charles P.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HEBIS Datenaustausch Darmstadt</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010490237&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-010490237</subfield></datafield></record></collection> |
id | DE-604.BV017410629 |
illustrated | Illustrated |
indexdate | 2024-07-09T19:17:40Z |
institution | BVB |
isbn | 0131840274 |
language | English |
lccn | 2003058165 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-010490237 |
oclc_num | 52798933 |
open_access_boolean | |
owner | DE-703 |
owner_facet | DE-703 |
physical | XXI, 232 S. Ill. |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Pearson/Prentice Hall |
record_format | marc |
spelling | Volonino, Linda Verfasser aut Principles and practice of information security protecting computers from hackers and lawyers Linda Volonino, Stephen R. Robinson with contributions by Charles P. Volonino Upper Saddle River, NJ Pearson/Prentice Hall 2004 XXI, 232 S. Ill. txt rdacontent n rdamedia nc rdacarrier Computer networks Security measures Computer security Internet Security measures Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s DE-604 Robinson, Stephen R. Sonstige oth Volonino, Charles P. Sonstige oth HEBIS Datenaustausch Darmstadt application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010490237&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Volonino, Linda Principles and practice of information security protecting computers from hackers and lawyers Computer networks Security measures Computer security Internet Security measures Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4070085-9 |
title | Principles and practice of information security protecting computers from hackers and lawyers |
title_auth | Principles and practice of information security protecting computers from hackers and lawyers |
title_exact_search | Principles and practice of information security protecting computers from hackers and lawyers |
title_full | Principles and practice of information security protecting computers from hackers and lawyers Linda Volonino, Stephen R. Robinson with contributions by Charles P. Volonino |
title_fullStr | Principles and practice of information security protecting computers from hackers and lawyers Linda Volonino, Stephen R. Robinson with contributions by Charles P. Volonino |
title_full_unstemmed | Principles and practice of information security protecting computers from hackers and lawyers Linda Volonino, Stephen R. Robinson with contributions by Charles P. Volonino |
title_short | Principles and practice of information security |
title_sort | principles and practice of information security protecting computers from hackers and lawyers |
title_sub | protecting computers from hackers and lawyers |
topic | Computer networks Security measures Computer security Internet Security measures Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | Computer networks Security measures Computer security Internet Security measures Computersicherheit Rechnernetz |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010490237&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT voloninolinda principlesandpracticeofinformationsecurityprotectingcomputersfromhackersandlawyers AT robinsonstephenr principlesandpracticeofinformationsecurityprotectingcomputersfromhackersandlawyers AT voloninocharlesp principlesandpracticeofinformationsecurityprotectingcomputersfromhackersandlawyers |