Security in computing / (Record no. 611188)

000 -LEADER
fixed length control field 01382nam a22003135i 4500
001 - CONTROL NUMBER
control field 22984967
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240828132542.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230223s2023 mau 000 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2023933248
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780137891214
Qualifying information (paperback)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780137891252
Qualifying information (epub)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780137891306
Qualifying information (Adobe pdf)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions rda
Transcribing agency DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8,PFL
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Pfleeger, Charles P.,
Relator term author.
9 (RLIN) 95108
245 10 - TITLE STATEMENT
Title Security in computing /
Statement of responsibility, etc. Charles P. Pfleeger, Shari Lawrence Pfleeger, Lizzie Coles-Kemp.
250 ## - EDITION STATEMENT
Edition statement Sixth edition.
263 ## - PROJECTED PUBLICATION DATE
Projected publication date 2307
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Boston :
Name of producer, publisher, distributor, manufacturer Addison-Wesley,
Date of production, publication, distribution, manufacture, or copyright notice 2023.
300 ## - PHYSICAL DESCRIPTION
Extent pages cm
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Introduction (Page-1), Toolbox: Authentication, Access Control, and Cryptography (Page-38), Programs and Programming (Page-141), The Internet—User Side (Page-248), Operating Systems (Page-323), Networks (Page-385), Data and Databases (Page-549), New Territory (Page-601), Privacy (Page-659), Management and Incidents (Page-727), Legal Issues and Ethics (Page-781), Details of Cryptography (Page-850), Emerging Topics (Page-895).
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Pfleeger, Shari Lawrence,
Relator term author.
9 (RLIN) 6083
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Coles-Kemp, Lizzie,
Relator term author.
9 (RLIN) 125436
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Reference
Source of classification or shelving scheme
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Full call number Barcode Date last seen Price effective from Koha item type Public note
          Military College of Signals (MCS) Military College of Signals (MCS) General Stacks 08/28/2024 005.8,PFL MCS38790 08/28/2024 08/28/2024 Book Almirah Fresh No.9, Shelf No.2
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.