Introduction to computer security / (Record no. 6885)
[ view plain ]
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
|---|---|
| fixed length control field | 120219s2011 maua b 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
| LC control number | 2010028536 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9780321702012 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 0321702018 |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (Sirsi) u7987 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | EG-CaNU |
| Transcribing agency | EG-CaNU |
| Modifying agency | EG-CaNU |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | ncode |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| Edition number | 22 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Goodrich, Michael T. |
| 9 (RLIN) | 14421 |
| 245 10 - TITLE STATEMENT | |
| Title | Introduction to computer security / |
| Statement of responsibility, etc. | Michael T. Goodrich & Roberto Tamassia. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Boston : |
| Name of publisher, distributor, etc. | Addison-Wesley, |
| Date of publication, distribution, etc. | c2011. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xix, 556 p. : |
| Other physical details | ill. ; |
| Dimensions | 27 cm. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc. note | Includes bibliographical references (p. 541-546) and index. |
| 505 0# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | 1 Introduction -- 2 Physical Security -- 3 Operating Systems Security -- 4 Malware -- 5 Network Security -- 6 Network Security II -- 7 Web Security -- 8 Cryptography -- 9 Security Models and Practice -- 10 Distributed-Applications Security. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Unlike most other computer security textbooks available today, Introduction to Computer Security, 1e does NOT focus on the mathematical and computational foundations of security, and it does not assume an extensive background in computer science. Instead it looks at the systems, technology, management, and policy side of security, and offers students fundamental security concepts and a working knowledge of threats and countermeasures with “just-enough” background in computer science. The result is a presentation of the material that is accessible to students of all levels. |
| 596 ## - | |
| -- | 1 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer security. |
| 9 (RLIN) | 14422 |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Tamassia, Roberto, |
| Dates associated with a name | 1960- |
| 9 (RLIN) | 14423 |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Total Checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Main library | Main library | General Stacks | 01/26/2020 | AHRA-P | 005.8 / GO.I 2011 | 011661 | 11/24/2019 | 1 | 11/24/2019 | Books | |||||
| Dewey Decimal Classification | Main library | Main library | General Stacks | 01/26/2020 | PURCHASE | 005.8 / GO.I 2011 | 011644 | 11/24/2019 | 2 | 11/24/2019 | Books |