Information security : (Record no. 6434)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02295nam a22002417a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OSt |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240115083946.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 210924b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780470626399 (hardback) |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | BUL |
Transcribing agency | BUL |
Modifying agency | BUL |
Language of cataloging | eng |
Description conventions | rda |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
Item number | STA |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Stamp, Mark. |
245 10 - TITLE STATEMENT | |
Title | Information security : |
Remainder of title | principles and practice / |
Statement of responsibility, etc. | Mark Stamp. |
250 ## - EDITION STATEMENT | |
Edition statement | 2nd edition. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Hoboken, NJ : |
Name of publisher, distributor, etc. | Wiley, |
Date of publication, distribution, etc. | c2011. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxi, 584 p. : |
Other physical details | ill. ; |
Dimensions | 25 cm. |
500 ## - GENERAL NOTE | |
General note | CONTENTS<br/><br/>INTRODUCTION<br/>the cast of characters<br/>Alice's online Bank<br/>about this book<br/>the people problem<br/>principle and practice<br/>problems<br/><br/>CRYPTO<br/>Crypto basics<br/>introduction<br/>how to speak crypto<br/>classic crypto<br/><br/>SYMMETRIC KEY CRYPTO<br/>Introduction<br/>Stream Ciphers<br/>Block Ciphers<br/>Integrity<br/>Summary<br/>Problems<br/><br/>PUBLIC KEY CRYPTO<br/>Introduction<br/>Knapsack<br/>RSA<br/>Diffie-Hellman<br/>Elliptic Curve Cryptography<br/>Public key infrastructure<br/>Uses for public key crypto<br/>Public Key Infrastructure<br/><br/>HASH FUNCTIONS++<br/>Introduction<br/>what is a cryptographic hash function<br/>the birthday attack<br/>Non-cryptographic hash function?<br/>e.tc<br/><br/>ADVANCED CRYPTANALYSIS<br/>Introduction<br/>Enigma<br/>RC4 as used in WEP<br/>Linear and differential cryptanalysis<br/>e.tc<br/><br/>ACCESS CONTROL<br/><br/>AUTHENTICATION<br/>introduction<br/>Authentication methods<br/>Passwords<br/>Biometrics<br/>Something you have<br/>e.tc<br/><br/>AUTHORIZATION<br/>introduction<br/>a brief history of authorization<br/>access control matrix<br/>multilevel security models<br/>e.tc<br/><br/>PROTOCOLS<br/>SIMPLE AUTHENTICATION PROTOCOLS<br/>introduction<br/>simple security protocols<br/>authentication protocols<br/>authentication and TCP<br/>e.tc<br/><br/>REAL-WORLD SECURITY PROTOCOLS<br/>introduction<br/>SSH<br/>SSL<br/>IPSec<br/>e.tc<br/><br/>SOFTWARE <br/>SOFTWARE FLWAS AND MALWARE<br/>introduction<br/>Software flaws<br/>malware<br/>botnets<br/>e.tc<br/><br/>INSECURITY IN SOFTWARE<br/>Introduction<br/>Software reserve engineering<br/>Digital rights management<br/>e.tc<br/><br/>OPERATING SYSTEMS AND SECURITY<br/>Introduction<br/>OS security functions<br/>Trusted operating system<br/>e.tc<br/><br/> |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes bibliographical references (p. 531-571) and index p. 572-584 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS / Security / General |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Book Closed Access |
Edition | 2nd edition. |
Classification part | 005.8 |
Item part | 1 |
Call number prefix | STA |
Call number suffix | 005.8 STA |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Inventory number | Total Checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Engineering Library | Engineering Library | 09/24/2021 | Purchased | 0027630 | 005.8 STA 1 | BUML24010406 | 09/24/2021 | 1 | 09/24/2021 | Book Closed Access |