MARC details
000 -LEADER |
fixed length control field |
02088nam a22002297a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
CUTN |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20190326170200.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
190326b xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9789352866533 |
041 ## - LANGUAGE CODE |
Language |
English |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
PFL |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Pfleeger, Charles P |
245 ## - TITLE STATEMENT |
Title |
Security in computing |
Statement of responsibility, etc |
Charles P Pfleeger; Shari Lawrence Pfleeger; Jonathan Margulies |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
New Delhi : |
Name of publisher, distributor, etc |
India Pearson India Education Services, |
Date of publication, distribution, etc |
© 2018. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxxiii, 910 pages : |
Dimensions |
24 cm. |
505 ## - FORMATTED CONTENTS NOTE |
Title |
Toolbox : authentication, access control, and cryptography --<br/> |
-- |
Programs and programming --<br/><br/> |
-- |
The Web : user side --<br/><br/> |
-- |
Operating systems --<br/><br/><br/> |
-- |
Networks --<br/><br/><br/><br/> |
-- |
Databases --<br/><br/><br/><br/><br/> |
-- |
Cloud computing --<br/><br/><br/><br/><br/><br/> |
-- |
Privacy --<br/><br/><br/><br/><br/><br/><br/> |
-- |
Management and incidents --<br/><br/><br/><br/><br/><br/><br/><br/> |
-- |
Legal issues and ethics --<br/><br/><br/><br/><br/><br/><br/><br/><br/> |
-- |
Details of cryptography --<br/><br/><br/><br/><br/><br/><br/><br/><br/> |
-- |
Emerging topics.<br/><br/><br/><br/><br/><br/><br/><br/><br/> |
520 ## - SUMMARY, ETC. |
Summary, etc |
Security in Computing is the most complete and up-to-date college textbook now available. Enlivened by actual case studies and supported by more than 175 exercises, the book covers viruses, worms, Trojan horses, and other forms of malicious code; firewalls and the protection of networked systems; E-mail privacy, including PEM, PGP, key management, and certificates; key escrow - both as a technology and in the "Clipper" program; evaluation of trusted systems, including the Common Criteria, the ITSEC, and the OrangeBook; standards for program development and quality, including ISO9000 and SEI CMM; administering secure installations of PCs, UNIX, and networked environments; and ethical and legal issues in computing. A modular, layered structure makes Security in Computing ideal for classroom use as well as a reference for professionals. Once the basic tools have been covered, the remaining chapters can be studied in any order, and to any depth desired |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data protection |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Electronic data processing departments--Security measures |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
General Books |