Java 2 network security -(E-BOOK) (Record no. 192019)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01567 a2200265 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | Nust |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20170207154028.0 |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
| LC control number | 99041138 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 0130155926 |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (DLC) 99041138 |
| 040 ## - CATALOGING SOURCE | |
| Transcribing agency | Nust |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Pistoia, Marco |
| 245 00 - TITLE STATEMENT | |
| Title | Java 2 network security -(E-BOOK) |
| Statement of responsibility, etc. | Marco Pistoia ... [et al.]. |
| 250 ## - EDITION STATEMENT | |
| Edition statement | 2nd ed. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Upper Saddle River, N.J. : |
| Name of publisher, distributor, etc. | Prentice Hall, |
| Date of publication, distribution, etc. | c1999. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xxi, 713 p. : |
| Other physical details | ill. ; |
| Dimensions | 24 cm. + |
| Accompanying material | 1 computer disk (3 1/2 in.) |
| 440 #0 - SERIES STATEMENT/ADDED ENTRY--TITLE | |
| Title | ITSO networking series |
| 505 ## - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Part 1. Introduction to Java and Security (Page-1) Chapter 2. Attack and Defense(Page-35) Chapter 3. The New Java Security Model (Page-69) Chapter 4. The Java Virtual Machine (Page-109) Chapter 5. Class Files in Java 2 (Page-117) Chapter 6. The Class Loader and Class File Verifier (Page-145) Chapter 7. The Java 2 Security Manager (Page-187) Chapter 8. Security Configuration Files in the Java 2 SDK(Page-225) Chapter 9. Java 2 SDK Security Tools (Page-259) Chapter 10. Security APIs in Java 2 (Page-297) Chapter 11. The Java Plug-In (Page-359) Chapter 12. Java Gets Out of Its Box (Page-385) Chapter 13. Cryptography in Java 2 (Page-475) Chapter 14. Enterprise Java (Page-501) Chapter 15. Java and Firewalls – In and Out of the Net (Page-557) Chapter 16. Java and SSL(Page-603) Chapter 17. Epilogue(Page-635) |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer networks |
| General subdivision | Security measures. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer security. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Java (Computer program language) |
| 651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME | |
| Geographic name | E-BOOK |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Pistoia, Marco. |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | |
| Koha item type | Book |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Permanent Location | Current Location | Date acquired | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Military College of Signals (MCS) | Military College of Signals (MCS) | 12/12/2016 | 005.8.PIS | MCSEB-1184 | 12/08/2016 | 12/12/2016 | Book |
