Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--

Introduction to computer security / (Record no. 5609)

MARC details
000 -LEADER
fixed length control field 01279cam a2200313 n 4500
001 - CONTROL NUMBER
control field 16342136
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210427092758.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100721s2011 maua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2010028536
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780321512949 (alk. paper)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0321512944 (alk. paper)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency DLC
Description conventions rda
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number G655 2011
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
Item number G.M.I
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Goodrich, Michael T.
9 (RLIN) 25915
245 10 - TITLE STATEMENT
Title Introduction to computer security /
Statement of responsibility, etc Michael T. Goodrich & Roberto Tamassia.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Boston :
Name of publisher, distributor, etc Addison-Wesley,
Date of publication, distribution, etc c2011.
300 ## - PHYSICAL DESCRIPTION
Extent xix, 556 pages. :
Other physical details illustrations ;
Dimensions 27 cm.
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references (p. 541-546) and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1 Introduction -2 Physical Security 55 - 3 Operating Systems Security 113<br/> -4 Malware 173 - 5 Network Security I 221 - 6 Network Security II 269 - 7 Web Security 327 - 8 Cryptography 387 - 9 Security Models and Practice 445 - 10 Distributed-Applications Security 487 - <br/><br/><br/><br/><br/><br/><br/><br/><br/>
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
9 (RLIN) 25916
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Tamassia, Roberto,
Dates associated with a name 1960-
9 (RLIN) 25917
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
Source of classification or shelving scheme Dewey Decimal Classification
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Inventory number Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
  Dewey Decimal Classification     Computers & Information Technology ( Computer Science ) Main library Main library A2 19/02/2012 Sphinx publishing 240.00 PU   005.8 G.M.I 00005189 17/07/2023 19/02/2012 Books