<?xml version="1.0" encoding="UTF-8"?>
<mods xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" version="3.1" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-1.xsd">
  <titleInfo>
    <title>Security in computing</title>
  </titleInfo>
  <name type="personal">
    <namePart>Pfleeger, Charles P.</namePart>
    <role>
      <roleTerm authority="marcrelator" type="text">creator</roleTerm>
    </role>
  </name>
  <typeOfResource/>
  <genre authority="">Bok</genre>
  <originInfo>
    <place>
      <placeTerm type="text">Upper Saddle River, N.J</placeTerm>
    </place>
    <publisher>Prentice Hall</publisher>
    <dateIssued>cop. 1997</dateIssued>
    <edition>2nd ed.</edition>
    <issuance/>
  </originInfo>
  <physicalDescription>
    <extent>xviii,574 p ill.</extent>
  </physicalDescription>
  <tableOfContents>Is There a Security Problem in Computing (Page-1) Basic Encryption and Decryption (Page-21) Security Encryption  Systems (Page-69) Using Encryption Protocols and Practices (Page-126) Production and General Purpose Operating Systems (Page-228) Designing Trusted Operating Systems (Page-269) Data Base Security (Page-336) Security in Networks and Distributed Systems (Page-377) Administering Security (Page-447) Legal and Ethical Issues in Computer Security (Page-492) </tableOfContents>
  <note type="statement of responsibility">Charles P. Pfleeger</note>
  <note>Almirah No.8  Shelf No.5</note>
  <subject authority="lcsh">
    <topic>Computer security</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Computer security</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Computer security</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Cryptography</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Data protection</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Data protection</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Dataintegritet</topic>
  </subject>
  <subject authority="lcsh">
    <topic>datas�kerhet</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Datas�kerhet</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Datas�kerhet</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Dataskydd</topic>
  </subject>
  <subject authority="lcsh">
    <topic>IT-s�kerhet</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Kryptering</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Privacy, Right of</topic>
  </subject>
  <classification authority="ddc">005.8</classification>
  <classification authority="ddc">005.8</classification>
  <classification authority="ddc">005.8</classification>
  <classification authority="ddc">005.8</classification>
  <classification authority="ddc">a005.8</classification>
  <identifier type="isbn">0-13-185794-0 (International ed.)</identifier>
  <identifier type="isbn">0-13-337486-6</identifier>
  <recordInfo>
    <recordContentSource authority="marcorg"/>
    <recordChangeDate encoding="iso8601">20170207154056.0</recordChangeDate>
  </recordInfo>
</mods>
