<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd" xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>00000cam a22000003a 4500</leader>
  <controlfield tag="001">UP-1685594773861954747</controlfield>
  <controlfield tag="003">Buklod</controlfield>
  <controlfield tag="005">20140425083551.0</controlfield>
  <controlfield tag="006">g||| |     ||   ||</controlfield>
  <controlfield tag="007">ta</controlfield>
  <controlfield tag="008">140425s2010    xx     d     r    |||| u|</controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9788132206668(pbk.)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">0857290053 (pbk.)</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="a">(iLib)UPBAG-00013429714</subfield>
  </datafield>
  <datafield tag="090" ind1=" " ind2=" ">
   <subfield code="a">QA 76.9 A25</subfield>
   <subfield code="b">S24 2010</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
   <subfield code="a">Salomon, D.</subfield>
   <subfield code="q">(David)</subfield>
   <subfield code="d">1938-</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
   <subfield code="a">Elements of computer security</subfield>
   <subfield code="c">David Salomon.</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2="1">
   <subfield code="a">New York</subfield>
   <subfield code="b">Springer-Verlag</subfield>
   <subfield code="c">c2010.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">xix, 374 p.</subfield>
   <subfield code="b">ill</subfield>
   <subfield code="c">24 cm</subfield>
  </datafield>
  <datafield tag="490" ind1="0" ind2=" ">
   <subfield code="a">Undergraduate topics in computer science</subfield>
  </datafield>
  <datafield tag="500" ind1=" " ind2=" ">
   <subfield code="a">Reprint: Springer international edition.</subfield>
  </datafield>
  <datafield tag="504" ind1=" " ind2=" ">
   <subfield code="a">Includes bibliographical references and webography (p. [347]-361) and index.</subfield>
  </datafield>
  <datafield tag="505" ind1="0" ind2=" ">
   <subfield code="a">1. Physical security. -- Side-channel attacks -- Physical threats -- Laptop security -- Disaster recovery planning -- Privacy protection -- 2. Viruses. -- Operating systems -- Computer viruses -- Virus writers -- Virus propagation -- Virus classification -- Boot sector viruses -- File infector viruses -- Companion viruses -- Multipartite viruses -- Macro and script viruses -- Infected images -- Virus life cycle -- Viruses and UNIX -- Viruses and the Macintosh -- Virus replication -- Virus payload -- Virus organization -- Virus naming -- Virus hiding methods -- Polymorphism -- Virus stealth techniques -- Interrupts and viruses -- Trapdoors -- 3. Worms. -- Code Red I -- Worming techniques -- Proposing a  CCDC -- The internet worm -- iPhone worms  -- 4. Trojan horses. -- Applications of Trojans -- Installing a Trojan -- Rigging a compiler -- 5.Examples of malware. -- The Lehigh Virus -- The Brain Virus -- The Michaelangelo Virus -- The SirCAM Virus -- The Melissa Virus -- Scores Virus -- Swiss Amiga Virus -- Christmas Card Virus -- VBS.KAK Worm -- The Cruncher Virus -- Opener Virus -- MTX Worm/Virus -- 6. Prevention and defense. -- Understanding  vulnerabilities -- Defenses against Malware -- Anti-Virus Software -- Backups and such -- Botnets, Zombies, and remote control -- Hoaxes -- 7. Network security. -- Internet vulnerabilities -- Port scanning -- Spoofs -- Spam -- Denial of service -- Firewall basics -- Other threats -- 8. Authentication. -- Local authentication -- Biometric techniques -- Passwords -- 9. Spyware. -- Introduction and definition -- RIAA and Spyware -- Terrorism and Spyware -- Political contributions -- Distributions of Spyware -- Remote reporting -- Adware -- Spyware? -- 10. Identity theft. -- Introduction -- Shredding -- Internet cookies -- Phishing -- The Homograph Threat -- 11. Privacy and trust. -- Privacy issues -- Online privacy -- Children's privacy -- Digital forensics -- Trust -- The Hacker -- 133t Speak -- Virus Timeline.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Computer security.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Computer networks</subfield>
   <subfield code="x">Security measures.</subfield>
  </datafield>
  <datafield tag="852" ind1="0" ind2=" ">
   <subfield code="a">UPBAG</subfield>
   <subfield code="b">UPBAG-MAIN</subfield>
   <subfield code="h">QA 76.9.A25 S24 2010</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
   <subfield code="a">Book</subfield>
  </datafield>
 </record>
</collection>
