What every engineer should know about cyber security and digital forensics / (Record no. 15786)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03010nam a2200409Ii 4500 |
001 - CONTROL NUMBER | |
control field | CRC0KE20860PDF |
003 - CONTROL NUMBER IDENTIFIER | |
control field | FlBoTFG |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20171224123811.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION | |
fixed length control field | m|||||o||d|||||||| |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr|||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 150323t20142014fluad ob 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781466564541 (ebook : PDF) |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | FlBoTFG |
Language of cataloging | eng |
Transcribing agency | FlBoTFG |
Description conventions | rda |
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (OCLC) | |
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) | TK5105.59 |
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) | .D44 2014 |
092 ## - LOCALLY ASSIGNED DEWEY CALL NUMBER (OCLC) | |
Classification number | 005.8 |
Item number | D316 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | DeFranco, Joanna F., |
Relator term | author. |
245 10 - TITLE STATEMENT | |
Title | What every engineer should know about cyber security and digital forensics / |
Statement of responsibility, etc | Joanna F. DeFranco. |
246 30 - VARYING FORM OF TITLE | |
Title proper/short title | Cyber security and digital forensics |
264 #1 - | |
-- | Boca Raton : |
-- | CRC Press, |
-- | [2014] |
264 #4 - | |
-- | �201 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource : |
Other physical details | text file, PD |
336 ## - | |
-- | text |
-- | rdaconten |
337 ## - | |
-- | computer |
-- | rdamedi |
338 ## - | |
-- | online resource |
-- | rdacarrie |
490 ## - SERIES STATEMENT | |
Series statement | What every engineer should kno |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes bibliographical references and index |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | 1. Security threats -- 2. Cyber security and digital forensics careers -- 3. Cyber security -- 4. Preparing for an incident -- 5. Incident response and digital forensics -- 6. The law -- 7. Theory to practice |
520 ## - SUMMARY, ETC. | |
Summary, etc | "This book offers the non-security professional an introduction to the security risks involved when using technology and discusses how to mitigate the risk of security incidents. The book introduces the information security topics every engineer should understand if they use a computer or any mobile device that is connected to the Internet. Most engineers work at employers that want their data secure, but not every employer invests in training their engineers in understanding the risk. It is a well-known fact that the weakest link in any secure system is not the system--it is the user. Just ask any hacker. Topics include network security, personal data security, cloud computing, mobile computing, preparing for an incident, incident response, evidence handling, Internet usage, and security certifications. The book also discusses cyber-physical systems such as the smart electric grid, smart transportation, and advanced manufacturing to demonstrate the impact of security on different engineering disciplines. In addition, the book covers the application of the concepts, presented via short case studies of real-world incidents throughout, chronologically delineating related events. It also provides information on certifications and reference manuals in the area of information security and digital forensics"-- |
-- | Provided by publisher |
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE | |
Additional physical form available note | Also available in print format |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Security measures |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer crimes |
General subdivision | Investigation |
655 ## - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
Source of term | lcs |
776 ## - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Print version: |
International Standard Book Number | 978146656452 |
830 ## - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | What every engineer should know |
856 ## - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://marc.crcnetbase.com/isbn/9781466564541 |
Electronic format type | application/PDF |
Public note | Distributed by publisher. Purchase or institutional license may be required for access |
No items available.