000 -LEADER |
fixed length control field |
01863cam a2200277 a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20190822101341.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
110817s2008 njua b 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780135137116 |
|
International Standard Book Number |
013513711x |
041 ## - Language |
Language code of text/sound track or separate title |
eng |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
Item number |
S685 2012 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
Item number |
S782 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Stallings, William. |
9 (RLIN) |
1300 |
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Title |
Computer security : |
Remainder of title |
principles and practice / |
Statement of responsibility, etc |
William Stallings, Lawrie Brown ; with contributions by Mick Bauer, Michael Howard. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Upper Saddle River, N.J. : |
Name of publisher, distributor, etc |
Pearson Education, |
Date of publication, distribution, etc |
2008. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xvii, 798 p. : |
Other physical details |
ill ; |
Dimensions |
24 cm. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Cryptographic tools -- User authentication -- Access control -- Database security -- Malicious software -- Denial-of-service attacks -- Intrusion detection -- Firewalls and intrusion prevention systems -- Buffer overflow -- Software security -- Operating system security -- Trusted computing and multilevel security -- IT security management and risk assessment -- IT security controls, plans, and procedures -- Physical and infrastructure security -- Human resources security -- Security auditing -- Legal and ethical aspects -- Symmetric encryption and message confidentiality -- Public-key cryptography and message authentication -- Internet security protocols and standards -- Internet authentication applications -- Wireless network security -- Appendix A. Projects and other student exercises for teaching computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
9 (RLIN) |
25720 |
|
Topical term or geographic name as entry element |
Computer security |
General subdivision |
Examinations |
Form subdivision |
Study guides. |
9 (RLIN) |
5896 |
|
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures |
-- |
Examinations |
Form subdivision |
Study guides. |
9 (RLIN) |
202 |
|
Topical term or geographic name as entry element |
Electronic data processing personnel |
General subdivision |
Certification |
Form subdivision |
Study guides. |
9 (RLIN) |
6654 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Brown, Lawrie. |
9 (RLIN) |
19932 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
Book |