<?xml version="1.0" encoding="UTF-8"?>
<record
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>01161    a2200217   4500</leader>
  <controlfield tag="003">Nust</controlfield>
  <controlfield tag="005">20220726121251.0</controlfield>
  <datafield tag="010" ind1=" " ind2=" ">
    <subfield code="a">   99045835</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">1580530451 (alk. paper)</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
    <subfield code="c">Nust</subfield>
  </datafield>
  <datafield tag="082" ind1="0" ind2="0">
    <subfield code="a">005.8,OPP</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
    <subfield code="a">Oppliger, Rolf.</subfield>
    <subfield code="9">59148</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
    <subfield code="a">Security technologies for the World Wide Web /</subfield>
    <subfield code="c">Rolf Oppliger.</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="a">Boston, MA :</subfield>
    <subfield code="b">Artech House,</subfield>
    <subfield code="c">c2000.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">xxi, 419 p.:</subfield>
    <subfield code="b">ill. ;</subfield>
    <subfield code="c">24 cm.</subfield>
  </datafield>
  <datafield tag="440" ind1=" " ind2="0">
    <subfield code="a">Artech House computer security series</subfield>
    <subfield code="9">95054</subfield>
  </datafield>
  <datafield tag="505" ind1=" " ind2=" ">
    <subfield code="a">Introduction (Page-1), HTTP user Authentication and Authorization (Page-21, Proxy Servers and Firewalls (Page-41), Cryptographic Techniques (Page-73), Internet Security Protocols (Page-95), SSL and TLS Protocols (Page-131), Electronic payment Systems (Page-171), Managing Certificate (Page-207), Executable Content (Page-241), CGI and API Scripts (Page-273), Mobile Code and Agent Based Systems (Page-289), Copyright Protection (Page-307), Privacy Protection and Anonymit services (Page-321), Censorship on the WWW (Page-353) .</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computer security.</subfield>
    <subfield code="9">570</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">World Wide Web</subfield>
    <subfield code="x">Security measures.</subfield>
    <subfield code="9">95171</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
    <subfield code="2">ddc</subfield>
    <subfield code="c">REF</subfield>
  </datafield>
  <datafield tag="999" ind1=" " ind2=" ">
    <subfield code="c">175306</subfield>
    <subfield code="d">175306</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="2">ddc</subfield>
    <subfield code="4">0</subfield>
    <subfield code="7">0</subfield>
    <subfield code="a">MCS</subfield>
    <subfield code="b">MCS</subfield>
    <subfield code="c">REF</subfield>
    <subfield code="d">2016-12-12</subfield>
    <subfield code="o">005.8,OPP</subfield>
    <subfield code="p">MCS28342</subfield>
    <subfield code="r">2016-12-08</subfield>
    <subfield code="w">2016-12-12</subfield>
    <subfield code="y">BK</subfield>
    <subfield code="z">Almirah No.18, Shelf No.3</subfield>
  </datafield>
</record>
