Computer security : (Record no. 1545)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02359cam a22003494a 4500 |
001 - CONTROL NUMBER | |
control field | 50251943 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250428151151.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 020719s2003 maua b 001 0 eng |
015 ## - NATIONAL BIBLIOGRAPHY NUMBER | |
National bibliography number | GBA2-U3904 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0201440997 |
Qualifying information | (alk. paper) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780201440997 |
Qualifying information | (alk. paper) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 2900201440996 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)50251943 |
Canceled/invalid control number | (OCoLC)50876313 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | DLC |
Language of cataloging | eng |
Transcribing agency | DLC |
Modifying agency | BAKER |
-- | NLGGC |
-- | YDXCP |
-- | OCLCQ |
-- | BTCTA |
-- | LVB |
-- | UQ1 |
-- | OCLCG |
-- | IG# |
-- | MNY |
-- | DEBBG |
-- | BDX |
-- | OCLCF |
-- | OCLCQ |
-- | UKM |
-- | SNU |
-- | UtOrBLW |
042 ## - AUTHENTICATION CODE | |
Authentication code | pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
Item number | B56 2003 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 21 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Bishop, Matt |
Fuller form of name | (Matthew A.) |
245 10 - TITLE STATEMENT | |
Title | Computer security : |
Remainder of title | art and science / |
Statement of responsibility, etc. | Matt Bishop |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Boston : |
Name of producer, publisher, distributor, manufacturer | Addison-Wesley, |
Date of production, publication, distribution, manufacture, or copyright notice | 2003 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xli, 1,084 pages : |
Other physical details | illustrations ; |
Dimensions | 24 cm |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | unmediated |
Media type code | n |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | volume |
Carrier type code | nc |
Source | rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes bibliographical references and index |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | pt. 1. Introduction -- 1. An overview of computer security -- pt. 2. Foundations -- 2. Access control matrix -- 3. Foundational results -- pt. 3. Policy -- 4. Security policies -- 5. Confidentiality policies -- 6. Integrity policies -- 7. Hybrid policies -- 8. Noninterference and policy composition -- pt. 4. Implementation I: cryptography -- 9. Basic cryptography -- 10. Key management -- 11. Cipher techniques -- 12. Authentication -- pt. 5. Implementation II: systems -- 13. Design principles -- 14. Representing identity -- 15. Access control mechanisms -- 16. Information flow -- 17. Confinement problem -- pt. 6. Assurance / by Elisabeth Sullivan -- 18. Introduction to assurance -- 19. Building systems with assurance -- 20. Formal methods -- 21. Evaluating systems -- pt. 7. Special topics -- 22. Malicious logic -- 23. Vulnerability analysis -- 24. Auditing -- 25. Intrusion detection -- pt. 8. Practicum -- 26. Network security -- 27. System security -- 28. User security -- 29. Program security -- pt. 9. End matter -- 30. Lattices -- 31. The extended Euclidean algorithm -- 32. Entropy and uncertainty -- 33. Virtual machines -- 34. Symbolic logic -- 35. Example academic security policy |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security |
655 #7 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Leermiddelen (vorm) |
Source of term | gtt |
Authority record control number or standard number | (NL-LeOCL)088143767 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | Books |
Suppress in OPAC | No |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection | Home library | Current library | Shelving location | Date acquired | Total checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Library of Congress Classification | Open Collection | Dato Maznah Library & Information Services | Dato Maznah Library & Information Services | QA Mathematics | 28/04/2025 | QA76.9.A25 B56 2003 | 00001598 | 28/04/2025 | 28/04/2025 | Books |