<?xml version="1.0" encoding="UTF-8"?>
<record
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>01181    a2200241   4500</leader>
  <controlfield tag="003">Nust</controlfield>
  <controlfield tag="005">20170207154030.0</controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">1-58053-295-0 ;</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
    <subfield code="c">Nust</subfield>
  </datafield>
  <datafield tag="082" ind1="0" ind2=" ">
    <subfield code="a">005.8</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
    <subfield code="a">Lang, Ulrich</subfield>
  </datafield>
  <datafield tag="245" ind1="0" ind2="0">
    <subfield code="a">Developing secure distributed applications with CORBA(E-BOOK)</subfield>
    <subfield code="c">Ulrich Lang, Rudolf Schreiner</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="a">Boston ;</subfield>
    <subfield code="a">London :</subfield>
    <subfield code="b">Artech House,</subfield>
    <subfield code="c">cop. 2002</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">xvii, 311s. :</subfield>
    <subfield code="b">ill. ;</subfield>
    <subfield code="c">23 cm</subfield>
  </datafield>
  <datafield tag="490" ind1="0" ind2=" ">
    <subfield code="a">Artech House computer security series</subfield>
  </datafield>
  <datafield tag="505" ind1=" " ind2=" ">
    <subfield code="a">Part I: CORBA Security. Introduction to CORBA &#x2014; Why CORBA? The Object Management Group (OMG). The Object Management Architecture (OMA). The Common Object Request Broker Architecture (CORBA). How does it all work together? Creating and Running an Example Application. The Security Basics &#x2014; What is Security? Why Security? Aspects of Security within CORBA. Security Management. Threats, Vulnerabilities, Countermeasures. Middleware Security</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computer security</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">CORBA (Computer architecture)</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Distributed databases</subfield>
    <subfield code="x">Security measures</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Distributed operating systems (Computers)</subfield>
  </datafield>
  <datafield tag="651" ind1=" " ind2=" ">
    <subfield code="a">E-BOOK</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
    <subfield code="a">Schreiner, Rudolf</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
    <subfield code="2">ddc</subfield>
    <subfield code="c">BK</subfield>
  </datafield>
  <datafield tag="999" ind1=" " ind2=" ">
    <subfield code="c">192136</subfield>
    <subfield code="d">192136</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="2">ddc</subfield>
    <subfield code="4">0</subfield>
    <subfield code="7">0</subfield>
    <subfield code="8">NFIC</subfield>
    <subfield code="a">MCS</subfield>
    <subfield code="b">MCS</subfield>
    <subfield code="d">2016-12-12</subfield>
    <subfield code="l">0</subfield>
    <subfield code="o">005.8  LAN</subfield>
    <subfield code="p">MCSEB-1290</subfield>
    <subfield code="r">2016-12-08</subfield>
    <subfield code="w">2016-12-12</subfield>
    <subfield code="y">BK</subfield>
  </datafield>
</record>
