Security strategies in Linux platforms and applications / (رقم التسجيلة. 25394)

تفاصيل مارك
000 -LEADER
fixed length control field 01852cam a2200301 i 4500
001 - CONTROL NUMBER
control field 18711234
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20170326085156.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 150722t20172017maua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2015028823
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781284090659
International Standard Book Number 1284090655
040 ## - CATALOGING SOURCE
Original cataloging agency RiNAUS
Language of cataloging eng
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
Item number J M S
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Jang, Michael H.
245 10 - TITLE STATEMENT
Title Security strategies in Linux platforms and applications /
Statement of responsibility, etc Michael Jang and Ric Messier.
250 ## - EDITION STATEMENT
Edition statement Second edition.
300 ## - PHYSICAL DESCRIPTION
Extent xxiii, 514 pages :
Other physical details illustrations ;
Dimensions 23 cm
490 0# - SERIES STATEMENT
Series statement Jones & Bartlett Learning information systems security & assurance series
500 ## - GENERAL NOTE
General note ISC-2017
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Security threats to Linux -- Basic components of Linux security -- Basic security : facilities through the boot process -- User privileges and permissions -- Filesystems, volumes, and encryption -- Every service is a potential risk -- Networks, firewalls, and more -- Networked filesystems and remote access -- Networked application security -- Kernel security risk mitigation -- Managing security alerts and updates -- Building and maintaining a security baseline -- Testing and reporting -- Detecting and responding to security breaches -- Best practices and emerging technologies.
520 ## - SUMMARY, ETC.
Summary, etc "The Second Edition of Security Strategies in Linux Platforms and Applications opens with a discussion of risks, threats, and vulnerabilities. Part 2 discusses how to take advantage of the layers of security and the modules associated with AppArmor and SELinux. Part 3 looks at the use of open source and proprietary tools when building a layered security strategy"--
630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE
Uniform title Linux.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Operating systems (Computers)
Topical term or geographic name as entry element Computer security.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Messier, Ric.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Item type كتب
المقتنيات
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Full call number Barcode Date last seen Copy number Price effective from Koha item type Total Checkouts Date last borrowed
    Dewey Decimal Classification   Not For Loan المكتبة الأمنية المكتبة الأمنية القاعة الرئيسية 21/03/2017 005.8 J M S 010049734 21/03/2017 1 21/03/2017 كتب    
    Dewey Decimal Classification     المكتبة الأمنية المكتبة الأمنية القاعة الرئيسية 21/03/2017 005.8 J M S 010049735 31/12/2022 2 21/03/2017 كتب 1 17/12/2022