Khulna University of Engineering & Technology
Central Library

What every engineer should know about cyber security and digital forensics / (Record no. 15786)

000 -LEADER
fixed length control field 03010nam a2200409Ii 4500
001 - CONTROL NUMBER
control field CRC0KE20860PDF
003 - CONTROL NUMBER IDENTIFIER
control field FlBoTFG
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20171224123811.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m|||||o||d||||||||
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 150323t20142014fluad ob 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781466564541 (ebook : PDF)
040 ## - CATALOGING SOURCE
Original cataloging agency FlBoTFG
Language of cataloging eng
Transcribing agency FlBoTFG
Description conventions rda
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (OCLC)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) TK5105.59
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) .D44 2014
092 ## - LOCALLY ASSIGNED DEWEY CALL NUMBER (OCLC)
Classification number 005.8
Item number D316
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name DeFranco, Joanna F.,
Relator term author.
245 10 - TITLE STATEMENT
Title What every engineer should know about cyber security and digital forensics /
Statement of responsibility, etc Joanna F. DeFranco.
246 30 - VARYING FORM OF TITLE
Title proper/short title Cyber security and digital forensics
264 #1 -
-- Boca Raton :
-- CRC Press,
-- [2014]
264 #4 -
-- �201
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource :
Other physical details text file, PD
336 ## -
-- text
-- rdaconten
337 ## -
-- computer
-- rdamedi
338 ## -
-- online resource
-- rdacarrie
490 ## - SERIES STATEMENT
Series statement What every engineer should kno
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note 1. Security threats -- 2. Cyber security and digital forensics careers -- 3. Cyber security -- 4. Preparing for an incident -- 5. Incident response and digital forensics -- 6. The law -- 7. Theory to practice
520 ## - SUMMARY, ETC.
Summary, etc "This book offers the non-security professional an introduction to the security risks involved when using technology and discusses how to mitigate the risk of security incidents. The book introduces the information security topics every engineer should understand if they use a computer or any mobile device that is connected to the Internet. Most engineers work at employers that want their data secure, but not every employer invests in training their engineers in understanding the risk. It is a well-known fact that the weakest link in any secure system is not the system--it is the user. Just ask any hacker. Topics include network security, personal data security, cloud computing, mobile computing, preparing for an incident, incident response, evidence handling, Internet usage, and security certifications. The book also discusses cyber-physical systems such as the smart electric grid, smart transportation, and advanced manufacturing to demonstrate the impact of security on different engineering disciplines. In addition, the book covers the application of the concepts, presented via short case studies of real-world incidents throughout, chronologically delineating related events. It also provides information on certifications and reference manuals in the area of information security and digital forensics"--
-- Provided by publisher
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Also available in print format
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes
General subdivision Investigation
655 ## - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
Source of term lcs
776 ## - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
International Standard Book Number 978146656452
830 ## - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title What every engineer should know
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://marc.crcnetbase.com/isbn/9781466564541
Electronic format type application/PDF
Public note Distributed by publisher. Purchase or institutional license may be required for access

No items available.



Khulna University of Engineering & Technology
Funded by: HEQEP, UGC, Bangladesh