MARC details
000 -LEADER |
fixed length control field |
01798nam a22002657a 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
240126s2019 |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780321712332 |
022 ## - INTERNATIONAL STANDARD SERIAL NUMBER |
ISSN-L |
9780321712332 |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
English |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
BIS |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Bishop, Matt |
9 (RLIN) |
158105 |
Relator term |
author |
245 ## - TITLE STATEMENT |
Title |
Computer Security Art and Science |
250 ## - EDITION STATEMENT |
Edition statement |
2nd |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Boston : |
Name of publisher, distributor, etc. |
Addision-Wesley, |
Date of publication, distribution, etc. |
c2019 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xlix, 1383 p. |
Other physical details |
: ill |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes Bibliographical References and Index |
520 ## - SUMMARY, ETC. |
Summary, etc. |
SUMMARY<br/><br/>In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer security. Reflecting dramatic growth in the quantity, complexity, and consequences of security incidents, Computer Security, Second Edition, links core principles with technologies, methodologies, and ideas that have emerged since the first edition’s publication.<br/><br/>Writing for advanced undergraduates and graduate students, Bishop covers foundational issues, policies, cryptography, systems design, assurance, and much more. He thoroughly addresses malware, vulnerability analysis, auditing, intrusion detection, and best-practice responses to attacks. In addition to new examples throughout, Bishop presents entirely new chapters on availability policy models and attack analysis.<br/> |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
9 (RLIN) |
151656 |
Topical term or geographic name entry element |
Computer Security |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
9 (RLIN) |
19 |
Topical term or geographic name entry element |
Computer Networks Security Measures |
700 ## - ADDED ENTRY--PERSONAL NAME |
Relator term |
author |
Personal name |
Sullivan, Elisabeth |
9 (RLIN) |
880355 |
700 ## - ADDED ENTRY--PERSONAL NAME |
Relator term |
author |
Personal name |
Ruppel, Michelle |
9 (RLIN) |
880356 |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Link text |
TOC |
Uniform Resource Identifier |
<a href="https://eaklibrary.neduet.edu.pk:8443/catalog/bk/books/toc/9780321712332.pdf">https://eaklibrary.neduet.edu.pk:8443/catalog/bk/books/toc/9780321712332.pdf</a> |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Link text |
WEB LINK |
Uniform Resource Identifier |
<a href="https://www.pearson.com/en-us/subject-catalog/p/computer-security-art-and-science/P200000000134/9780321712332?tab=table-of-contents ">https://www.pearson.com/en-us/subject-catalog/p/computer-security-art-and-science/P200000000134/9780321712332?tab=table-of-contents </a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Book |