Security strategies in windows platforms and applications (Record no. 1952)

MARC details
000 -LEADER
fixed length control field 02256nam a2200217Ia 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250730165327.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250728s9999 xx 000 0 und d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 978-07637-9193-3
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number C005. So4
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Solomon, Michael G.
245 #0 - TITLE STATEMENT
Title Security strategies in windows platforms and applications
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Sudbury, Mass
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Name of publisher, distributor, etc. Jones + Bartlett Learning
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Date of publication, distribution, etc. 2011
300 ## - PHYSICAL DESCRIPTION
Extent xv. 384 p. : ill
300 ## - PHYSICAL DESCRIPTION
Other physical details Includes index
520 ## - SUMMARY, ETC.
Summary, etc. This book is part of the Information Systems Security & Assurance Series from Jones & Bartlett Learning (www.jblearning.com). Designed for courses and curriculums in IT Security, Cybersecurity, Information Assurance, and Information Systems Security, this series features a comprehensive, consistent treatment of the most current thinking and trends in this critical subject area. These titles deliver fundamental information-security principles packed with real-world applications and examples. Authored by Certified Information Systems Security Professionals (CISSPs), they deliver comprehensive information on all aspects of information security. Reviewed word for word by leading technical experts in the field, these books are not just current, but forward-thinking putting you in the position to solve the cybersecurity challenges not just of today. but of tomorrow, as well. Part 1 of this book focuses on new risks, threats, and vulnerabilities associated with the Microsoft Windows operating system. Particular emphasis is placed on Windows XP. Vista, and 7 on the desktop, and Windows Server 2003 and 2008 versions. More than 90 percent of individuals, students, educators, businesses, organizations, and governments use Microsoft Windows, which has experienced frequent attacks against its well-publicized vulnerabilities. Part 2 emphasizes how to use tools and techniques to decrease risks arising from vulnerabilities in Microsoft Windows operating systems and applications. Part 3 provides a resource for readers and students desiring more information on Microsoft Windows OS hardening, application security, and incident management. among other issues.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Microsoft Windows(Computer file)
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total checkouts Full call number Barcode Date last seen Price effective from Koha item type
          PCC PCC CIRCULATION 07/30/2025   C005. So4 5161 07/30/2025 07/30/2025 Book