Computer Security Art and Science (Record no. 814801)

MARC details
000 -LEADER
fixed length control field 01798nam a22002657a 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240126s2019 |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780321712332
022 ## - INTERNATIONAL STANDARD SERIAL NUMBER
ISSN-L 9780321712332
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title English
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number BIS
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Bishop, Matt
9 (RLIN) 158105
Relator term author
245 ## - TITLE STATEMENT
Title Computer Security Art and Science
250 ## - EDITION STATEMENT
Edition statement 2nd
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boston :
Name of publisher, distributor, etc. Addision-Wesley,
Date of publication, distribution, etc. c2019
300 ## - PHYSICAL DESCRIPTION
Extent xlix, 1383 p.
Other physical details : ill
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes Bibliographical References and Index
520 ## - SUMMARY, ETC.
Summary, etc. SUMMARY<br/><br/>In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer security. Reflecting dramatic growth in the quantity, complexity, and consequences of security incidents, Computer Security, Second Edition, links core principles with technologies, methodologies, and ideas that have emerged since the first edition’s publication.<br/><br/>Writing for advanced undergraduates and graduate students, Bishop covers foundational issues, policies, cryptography, systems design, assurance, and much more. He thoroughly addresses malware, vulnerability analysis, auditing, intrusion detection, and best-practice responses to attacks. In addition to new examples throughout, Bishop presents entirely new chapters on availability policy models and attack analysis.<br/>
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 151656
Topical term or geographic name entry element Computer Security
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 19
Topical term or geographic name entry element Computer Networks Security Measures
700 ## - ADDED ENTRY--PERSONAL NAME
Relator term author
Personal name Sullivan, Elisabeth
9 (RLIN) 880355
700 ## - ADDED ENTRY--PERSONAL NAME
Relator term author
Personal name Ruppel, Michelle
9 (RLIN) 880356
856 ## - ELECTRONIC LOCATION AND ACCESS
Link text TOC
Uniform Resource Identifier <a href="https://eaklibrary.neduet.edu.pk:8443/catalog/bk/books/toc/9780321712332.pdf">https://eaklibrary.neduet.edu.pk:8443/catalog/bk/books/toc/9780321712332.pdf</a>
856 ## - ELECTRONIC LOCATION AND ACCESS
Link text WEB LINK
Uniform Resource Identifier <a href="https://www.pearson.com/en-us/subject-catalog/p/computer-security-art-and-science/P200000000134/9780321712332?tab=table-of-contents ">https://www.pearson.com/en-us/subject-catalog/p/computer-security-art-and-science/P200000000134/9780321712332?tab=table-of-contents </a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Physical Form Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Stock Type Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Budget Year Cost, replacement price Accession Date Koha item type
    Dewey Decimal Classification Text, Hardcover     Reference Section Reference Section Reference Section 23/01/2024 24 Purchased 20307.11   005.8 BIS 98603 23/01/2024 2023-2024 20307.11 23/01/2024 Reference Collection