MARC details
000 -LEADER |
fixed length control field |
01549nam a2200337 a 4500 |
001 - CONTROL NUMBER |
EWU control number |
9391 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
BD-DhEWU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240729124957.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
240729s2018 nyua g b 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780134794105 |
|
International Standard Book Number |
0134794109 |
035 ## - SYSTEM CONTROL NUMBER |
OCLC control number |
(OCLC)985071030 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
Description conventions |
rda |
Modifying agency |
BD-DhEWU |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Author mark and Year |
STC 2018 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Stallings, William. |
245 10 - TITLE STATEMENT |
Title |
Computer security : |
Remainder of title |
principles and practice / |
Statement of responsibility, etc |
William Stallings and Lawrie Brown. |
250 ## - EDITION STATEMENT |
Edition statement |
4th ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
New York : |
Name of publisher, distributor, etc |
Pearson, |
Date of publication, distribution, etc |
c2018. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxii, 778 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references (pages 742-754) and index. |
505 ## - FORMATTED CONTENTS NOTE |
Title |
Table of contents |
Contents note |
Part One: Computer Security Technology and Principles<br/>Part Two: Software and System Security<br/>Part Three: Management Issues<br/>Part Four: Cryptographic Algorithms<br/>Part Five: Network Security |
520 ## - SUMMARY, ETC. |
Summary, etc |
The objective of this book is to provide an up-to-date survey of developments in computer security. Central problems that confront security designers and security administrators include defining the threats to computer and network systems, evaluating the relative risks of these threats, and developing cost-effective and user friendly countermeasures |
526 ## - STUDY PROGRAM INFORMATION NOTE |
Program name |
Computer Science & Engineering |
Requested Dept. (EWU) |
Computer Science & Engineering |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name |
Computer security. |
|
Topical term or geographic name |
Computer networks |
General subdivision |
Security measures. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Brown, Lawrie. |
856 42 - ELECTRONIC LOCATION AND ACCESS |
Materials Specified |
WorldCat Details |
Uniform Resource Identifier |
https://search.worldcat.org/title/985071030 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Text |
953 ## - Fulltext in GSDL |
Is Fulltext Available in GSDL? |
Not Avaialable |