//]]>

Computer security : (Record no. 7993)

000 -LEADER
fixed length control field 01863cam a2200277 a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190822101341.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 110817s2008 njua b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780135137116
International Standard Book Number 013513711x
041 ## - Language
Language code of text/sound track or separate title eng
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number S685 2012
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
Item number S782
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Stallings, William.
9 (RLIN) 1300
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE
Title Computer security :
Remainder of title principles and practice /
Statement of responsibility, etc William Stallings, Lawrie Brown ; with contributions by Mick Bauer, Michael Howard.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Upper Saddle River, N.J. :
Name of publisher, distributor, etc Pearson Education,
Date of publication, distribution, etc 2008.
300 ## - PHYSICAL DESCRIPTION
Extent xvii, 798 p. :
Other physical details ill ;
Dimensions 24 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cryptographic tools -- User authentication -- Access control -- Database security -- Malicious software -- Denial-of-service attacks -- Intrusion detection -- Firewalls and intrusion prevention systems -- Buffer overflow -- Software security -- Operating system security -- Trusted computing and multilevel security -- IT security management and risk assessment -- IT security controls, plans, and procedures -- Physical and infrastructure security -- Human resources security -- Security auditing -- Legal and ethical aspects -- Symmetric encryption and message confidentiality -- Public-key cryptography and message authentication -- Internet security protocols and standards -- Internet authentication applications -- Wireless network security -- Appendix A. Projects and other student exercises for teaching computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
9 (RLIN) 25720
Topical term or geographic name as entry element Computer security
General subdivision Examinations
Form subdivision Study guides.
9 (RLIN) 5896
Topical term or geographic name as entry element Computer networks
General subdivision Security measures
-- Examinations
Form subdivision Study guides.
9 (RLIN) 202
Topical term or geographic name as entry element Electronic data processing personnel
General subdivision Certification
Form subdivision Study guides.
9 (RLIN) 6654
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Brown, Lawrie.
9 (RLIN) 19932
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Book
Copies
Price effective from Permanent location Date last seen Not for loan Date acquired Source of classification or shelving scheme Koha item type Lost status Cost, normal purchase price Withdrawn status Source of acquisition Cost, replacement price Date last borrowed Total Checkouts Damaged status Barcode Shelving location Current location Public note Full call number
2011-10-05AUM Main Library2020-02-24 2012-11-26 Book 28.40 Jordan Book Centre 22.722020-02-031 AUM-007235English Collections HallAUM Main LibraryJBC/2011/14004005.8 S782
2011-10-05AUM Main Library2012-11-26 2012-11-26 Book 28.40 Jordan Book Centre 22.72   AUM-007236English Collections HallAUM Main LibraryJBC/2011/14004005.8 S782

Languages: 
English |
العربية