Computer security (Record no. 11925)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01689cam a2200325 a 4500 |
| 001 - CONTROL NUMBER | |
| control field | 16470479 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20170105102351.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 100922s2011 enka b 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
| LC control number | 2010036859 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9780470741153 (pbk.) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 0470741155 (pbk.) |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (OCoLC)ocn666401859 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | DLC |
| Transcribing agency | DLC |
| Modifying agency | YDX |
| -- | YDXCP |
| -- | CDX |
| -- | UKWOH |
| -- | TTS |
| -- | DLC |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | pcc |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER | |
| Classification number | QA76.9.A25 |
| Item number | G65 2011 |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| Edition number | 22 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Gollmann, Dieter. |
| 245 10 - TITLE STATEMENT | |
| Title | Computer security |
| Statement of responsibility, etc. | Dieter Gollmann |
| 250 ## - EDITION STATEMENT | |
| Edition statement | 3rd ed. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Chichester, West Sussex : |
| Name of publisher, distributor, etc. | Wiley, |
| Date of publication, distribution, etc. | 2011. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xix, 436 p. : |
| Other physical details | ill. ; |
| Dimensions | 24 cm. |
| 500 ## - GENERAL NOTE | |
| General note | 1. Computer security. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc. note | Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | History of computer security -- Managing security -- Foundations of computer security -- Identification and authentication -- Access control -- Reference monitors -- Unix security -- Windows security -- Database security -- Software security -- Bell-LaPadula model -- Security models -- Security evaluation -- Cryptography -- Key establishment -- Communications security -- Network security -- Web security -- Mobility -- New access control paradigms. |
| 520 8# - SUMMARY, ETC. | |
| Summary, etc. | This text moves away from the 'multi-level' security approach to compare and evaluate design alternatives in computer security. It provides technology-proof insights, and covers the technical issues of computer security in the network environment. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer security. |
| 906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) | |
| a | 7 |
| b | cbc |
| c | orignew |
| d | 1 |
| e | ecip |
| f | 20 |
| g | y-gencatlg |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | |
| Koha item type | Book |
| Withdrawn status | Lost status | Damaged status | Not for loan | Collection code | Permanent Location | Current Location | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Total Checkouts | Full call number | Barcode | Date last seen | Date last checked out | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Central Library (CL) | Central Library (CL) | First Floor - Artificial Intelligence/Data Mining | 06/04/2013 | A&J DEF Tek Consultant | 3364.31 | 2 | 005.8 GOL | SEECS012421 | 01/18/2015 | 11/26/2014 | 06/14/2013 | Book |
