MARC details
000 -LEADER |
fixed length control field |
02121cam a2200301 i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
CUTN |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20190912172125.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
141022t20162016maua 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781284055931 (pbk.) |
041 ## - LANGUAGE CODE |
Language |
English |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
Item number |
SMI |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Smith, Richard E., |
245 10 - TITLE STATEMENT |
Title |
Elementary information security / |
Statement of responsibility, etc |
Richard E. Smith. |
250 ## - EDITION STATEMENT |
Edition statement |
Second edition. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Burlington, MA : |
Name of publisher, distributor, etc |
Jones & Bartlett Learning, |
Date of publication, distribution, etc |
©2016 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxi, 866 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm |
500 ## - GENERAL NOTE |
General note |
Includes index. |
505 ## - FORMATTED CONTENTS NOTE |
Title |
Chapter 1. Security from the Ground Up |
-- |
Chapter 2. Controlling a Computer |
-- |
Chapter 3. Controlling Files |
-- |
Chapter 4. Sharing Files |
-- |
Chapter 5. Storing Files |
-- |
Chapter 6. Authenticating People |
-- |
Chpater 7. Encrypting Files |
-- |
Chapter 8. Secret and Public Keys |
-- |
Chapter 9. Encrypting Volumes |
-- |
Chapter 10. Connecting Computers |
-- |
Chapter 11. Networks of Networks |
-- |
Chapter 12. End-to-End Networking |
-- |
Chapter 13. Enterprise Computing |
-- |
Chapter 14. Network Encryption |
-- |
Chapter 15. Internet Services and Email |
-- |
Chapter 16. The world Wide Web |
-- |
Chapter 17. Governments and Secrecy |
520 ## - SUMMARY, ETC. |
Summary, etc |
"An ideal text for introductory information security courses, the second edition of Elementary Information Security provides a comprehensive yet easy-to-understand introduction to the complex world of cybersecurity and technology. Thoroughly updated with recently reported cybersecurity incidents, this essential text enables students to gain direct experience by analyzing security problems and practicing simulated security activities. Emphasizing learning through experience, Elementary Information Security, Second Edition addresses technologies and cryptographic topics progressing from individual computers to more complex Internet-based systems."-- |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
General Books |
100 1# - MAIN ENTRY--PERSONAL NAME |
Dates associated with a name |
1952- |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
General subdivision |
Security measures. |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
orignew |
d |
1 |
e |
ecip |
f |
20 |
g |
y-gencatlg |