Security in computing (Record no. 27184)

MARC details
000 -LEADER
fixed length control field 02088nam a22002297a 4500
003 - CONTROL NUMBER IDENTIFIER
control field CUTN
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190326170200.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190326b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789352866533
041 ## - LANGUAGE CODE
Language English
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number PFL
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Pfleeger, Charles P
245 ## - TITLE STATEMENT
Title Security in computing
Statement of responsibility, etc Charles P Pfleeger; Shari Lawrence Pfleeger; Jonathan Margulies
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New Delhi :
Name of publisher, distributor, etc India Pearson India Education Services,
Date of publication, distribution, etc © 2018.
300 ## - PHYSICAL DESCRIPTION
Extent xxxiii, 910 pages :
Dimensions 24 cm.
505 ## - FORMATTED CONTENTS NOTE
Title Toolbox : authentication, access control, and cryptography --<br/>
-- Programs and programming --<br/><br/>
-- The Web : user side --<br/><br/>
-- Operating systems --<br/><br/><br/>
-- Networks --<br/><br/><br/><br/>
-- Databases --<br/><br/><br/><br/><br/>
-- Cloud computing --<br/><br/><br/><br/><br/><br/>
-- Privacy --<br/><br/><br/><br/><br/><br/><br/>
-- Management and incidents --<br/><br/><br/><br/><br/><br/><br/><br/>
-- Legal issues and ethics --<br/><br/><br/><br/><br/><br/><br/><br/><br/>
-- Details of cryptography --<br/><br/><br/><br/><br/><br/><br/><br/><br/>
-- Emerging topics.<br/><br/><br/><br/><br/><br/><br/><br/><br/>
520 ## - SUMMARY, ETC.
Summary, etc Security in Computing is the most complete and up-to-date college textbook now available. Enlivened by actual case studies and supported by more than 175 exercises, the book covers viruses, worms, Trojan horses, and other forms of malicious code; firewalls and the protection of networked systems; E-mail privacy, including PEM, PGP, key management, and certificates; key escrow - both as a technology and in the "Clipper" program; evaluation of trusted systems, including the Common Criteria, the ITSEC, and the OrangeBook; standards for program development and quality, including ISO9000 and SEI CMM; administering secure installations of PCs, UNIX, and networked environments; and ethical and legal issues in computing. A modular, layered structure makes Security in Computing ideal for classroom use as well as a reference for professionals. Once the basic tools have been covered, the remaining chapters can be studied in any order, and to any depth desired
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Electronic data processing departments--Security measures
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type General Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Location Shelving location Date of Cataloging Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Non-fiction CUTN Central Library CUTN Central Library Generalia 26/03/2019   005.8 PFL 36544 26/03/2019 26/03/2019 General Books

Powered by Koha