The myths of security : (Record no. 200436324)

000 -LEADER
fixed length control field 03921cam a2200469 i 4500
003 - CONTROL NUMBER IDENTIFIER
control field TR-AnTOB
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200217102747.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field ta
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 081117t20092009cc a b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2010286045
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBA8D6781
Source bnb
National bibliography number 014-84518
Source bnb
National bibliography number GBA-8D678
Source bnb
National bibliography number GBA8D6781
Source dnb
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780596523022 (pbk.)
International Standard Book Number 0596523025 (pbk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)263978539
System control number (TR-AnTOB)
040 ## - CATALOGING SOURCE
Original cataloging agency UKM
Language of cataloging eng
Description conventions rda
Transcribing agency UKM
Modifying agency BTCTA
-- YDXCP
-- NLGGC
-- BWX
-- CDX
-- OEM
-- C#P
-- VP@
-- GBVCP
-- ZAD
-- DEBBG
-- OCL
-- NSB
-- DLC
-- OCLCQ
-- OBE
-- CS1
-- MNW
-- FIN
-- TR-AnTOB
041 0# - LANGUAGE CODE
Language code of text/sound track or separate title İngilizce
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number V55 2009
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) QA76.9.A25
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) V55 2009
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Viega, John
Relator term author
Authority record control number or standard number http://id.loc.gov/authorities/names/n2001005797
9 (RLIN) 21484
245 14 - TITLE STATEMENT
Title The myths of security :
Remainder of title what the computer security industry doesn't want you to know /
Statement of responsibility, etc. John Viega.
250 ## - EDITION STATEMENT
Edition statement First edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Beijing ;
-- Cambridge ;
-- Sebastopol, CA :
Name of producer, publisher, distributor, manufacturer O'Reilly,
Date of production, publication, distribution, manufacture, or copyright notice [2009]
Date of production, publication, distribution, manufacture, or copyright notice ©2009
300 ## - PHYSICAL DESCRIPTION
Extent xix, 238 pages :
Other physical details illustrations ;
Dimensions 22 cm
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note
505 00 - FORMATTED CONTENTS NOTE
Title The security industry is broken --
-- Security : nobody cares! --
-- It's easier to get "owned" than you think --
-- It's good to be bad --
-- Test of a good security product : would I use it? --
-- Why Microsoft's free AV won't matter --
-- Google is evil --
-- Why most AV doesn't work (well) --
-- Why AV is often slow --
-- Four minutes to infection? --
-- Personal firewall problems --
-- Call it "antivirus" --
-- Why most people shouldn't run intrusion prevention systems --
-- Problems with host intrusion prevention --
-- Plenty of phish in the sea --
-- The cult of Schneier --
-- Helping others stay safe on the Internet --
-- Snake oil : legitimate vendors sell it, too --
-- Living in fear? --
-- Is Apple really more secure? --
-- OK, your mobile phone is insecure; should you care? --
-- Do AV vendors write their own viruses? --
-- One simple fix for the AV industry --
-- Open source security : a red herring --
-- Why SiteAdvisor was such a good idea --
-- Is there anything we can do about identity theft? --
-- Virtualization : host security's silver bullet? --
-- When will we get rid of all the security vulnerabilities? --
-- Application security on a budget --
-- "Responsible disclosure" isn't responsible --
-- Are man-in-the-middle attacks a myth? --
-- An attack on PKI --
-- HTTPS sucks : let's kill it! --
-- CrAP-TCHA and the usability/security tradeoff --
-- No death for the password --
-- Spam is dead --
-- Improving authentication --
-- Cloud insecurity? --
-- What AV companies should be doing (AV 2.0) --
-- VPNs usually decrease security --
-- Usability and security --
-- Privacy --
-- Anonymity --
-- Improving patch management --
-- An open security industry --
-- Academics --
-- Locksmithing --
-- Critical infrastructure.
520 ## - SUMMARY, ETC.
Summary, etc. If you think computer security has improved in recent years, Myths of Security will shake you out of your complacency. Longtime security professional John Viega reports on the sorry state of security, with concrete suggestions for professionals and individuals confronting the issue. Provocative, insightful, and often controversial, The Myths of Security addresses IT professionals who deal with security issues, and speaks to Mac and PC users who spend time online.
590 ## - LOCAL NOTE (RLIN)
Local note Donated by Kemal Bıçakçı
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection
Authority record control number or standard number http://id.loc.gov/authorities/subjects/sh85035859
9 (RLIN) 1313
Topical term or geographic name entry element Computer security
Authority record control number or standard number http://id.loc.gov/authorities/subjects/sh90001862
9 (RLIN) 912
Topical term or geographic name entry element Internet industry
General subdivision Security measures
Authority record control number or standard number http://id.loc.gov/authorities/subjects/sh96010223
-- http://id.loc.gov/authorities/subjects/sh99005297
9 (RLIN) 125637
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Not for loan Collection code Permanent Location Current Location Shelving location Date acquired Source of acquisition Full call number Barcode Date last seen Date shelved Koha item type Public note
      Ödünç Verilebilir / Available Genel Koleksiyon Merkez Kütüphane Merkez Kütüphane Genel Koleksiyon / Main Collection 2019-04-26 Bağış / Donation QA76.9.A25 V55 2009 0060331 2019-09-10 2019-09-17 Book Donated by Kemal Bıçakçı
Devinim Yazılım Eğitim Danışmanlık tarafından Koha'nın orjinal sürümü uyarlanarak geliştirilip kurulmuştur.