Security strategies in windows platforms and applications (Record no. 1952)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02256nam a2200217Ia 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20250730165327.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 250728s9999 xx 000 0 und d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 978-07637-9193-3 |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | C005. So4 |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Solomon, Michael G. |
| 245 #0 - TITLE STATEMENT | |
| Title | Security strategies in windows platforms and applications |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Sudbury, Mass |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Name of publisher, distributor, etc. | Jones + Bartlett Learning |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Date of publication, distribution, etc. | 2011 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xv. 384 p. : ill |
| 300 ## - PHYSICAL DESCRIPTION | |
| Other physical details | Includes index |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | This book is part of the Information Systems Security & Assurance Series from Jones & Bartlett Learning (www.jblearning.com). Designed for courses and curriculums in IT Security, Cybersecurity, Information Assurance, and Information Systems Security, this series features a comprehensive, consistent treatment of the most current thinking and trends in this critical subject area. These titles deliver fundamental information-security principles packed with real-world applications and examples. Authored by Certified Information Systems Security Professionals (CISSPs), they deliver comprehensive information on all aspects of information security. Reviewed word for word by leading technical experts in the field, these books are not just current, but forward-thinking putting you in the position to solve the cybersecurity challenges not just of today. but of tomorrow, as well. Part 1 of this book focuses on new risks, threats, and vulnerabilities associated with the Microsoft Windows operating system. Particular emphasis is placed on Windows XP. Vista, and 7 on the desktop, and Windows Server 2003 and 2008 versions. More than 90 percent of individuals, students, educators, businesses, organizations, and governments use Microsoft Windows, which has experienced frequent attacks against its well-publicized vulnerabilities. Part 2 emphasizes how to use tools and techniques to decrease risks arising from vulnerabilities in Microsoft Windows operating systems and applications. Part 3 provides a resource for readers and students desiring more information on Microsoft Windows OS hardening, application security, and incident management. among other issues. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer security |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Microsoft Windows(Computer file) |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | Book |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Total checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| PCC | PCC | CIRCULATION | 07/30/2025 | C005. So4 | 5161 | 07/30/2025 | 07/30/2025 | Book |