<?xml version="1.0" encoding="UTF-8"?>
<mods xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" version="3.1" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-1.xsd">
  <titleInfo>
    <title>Introduction to computer security</title>
  </titleInfo>
  <name type="personal">
    <namePart>Bishop, Matt</namePart>
    <role>
      <roleTerm authority="marcrelator" type="text">creator</roleTerm>
    </role>
  </name>
  <typeOfResource/>
  <originInfo>
    <place>
      <placeTerm type="text">India</placeTerm>
    </place>
    <publisher>Pearsons</publisher>
    <dateIssued>2006</dateIssued>
    <issuance/>
  </originInfo>
  <physicalDescription>
    <extent>xxix,585p.</extent>
  </physicalDescription>
  <tableOfContents>An Overview of Computer Security (Page-1), Information and Security Policies (Page-26), Basic Cryptography (Page-67), Cipher Techniques (Page-89), Authentication (Page-112),  Integrity Policies (Page-137), Design Principles (Page-155), Representing Identity (Page-165), Access Control Mechanisms (Page-186), Intrusion Detection (Page-207), Evaluating Systems (Page-225), Malicious Logic (Page-252), Vulerability Analysis (Page-275), Auditing (Page-305), Intrusion Detection (Page-331), Network Security (Page-359),  System Security (Page-385), User Security (Page-418), Program Security (Page-439), Lattices (Page-485), The Extended Euclidean Algorithm  (Page-488), Virtual Machines (Page-493). </tableOfContents>
  <note type="statement of responsibility">Matt Bishop</note>
  <subject>
    <topic>computer security</topic>
  </subject>
  <classification authority="ddc">005.8,BIS</classification>
  <identifier type="isbn">9788177584257</identifier>
  <recordInfo>
    <recordContentSource authority="marcorg"/>
    <recordChangeDate encoding="iso8601">20221019142036.0</recordChangeDate>
  </recordInfo>
</mods>
