Introduction to Computer Security, (Record no. 3371)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01437nam a2200241Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | RRU |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20231009162913.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 210901b ||||||||| ||||||| 0|eng|d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9788177584257 |
Printed Price | RS. 680.00 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | RRU |
Language of cataloging | English |
041 ## - LANGUAGE CODE | |
Language code of text/sound track or separate title | Eng. |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Class No. | 005.8 |
Item number | BIS |
100 ## - FIRST AUTHOR (IF A PERSON) | |
9 (RLIN) | 2192 |
Name of author | Bishop, Matt |
245 #0 - TITLE STATEMENT | |
Title | Introduction to Computer Security, |
Statement of responsibility | Matt, Bishop |
250 ## - EDITION STATEMENT | |
Edition statement | 12th Ed |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Name of publisher, distributor, etc. | Pearson Education India |
Place of publication, distribution, etc. | New Delhi |
Date of publication, distribution, etc. | 2013 |
300 ## - PHYSICAL DESCRIPTION | |
No. of pages | 585p. |
Other physical details | 20.3 x 25.4 x 4.7 cm |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Introduction to Computer Security draws upon Bishop's widely praised Computer Security: Art and Science, without the highly complex and mathematical coverage that most undergraduate students would find difficult or unnecessary. The result: the field's most concise, accessible and useful introduction. Matt Bishop thoroughly introduces fundamental techniques and principles for modeling and analyzing security. Readers learn how to express security requirements, translate requirements into policies, implement mechanisms that enforce policy and ensure that policies are effective. Along the way, the author explains how failures may be exploited by attackers and how attacks may be discovered, understood and countered. Supplements available including slides and solutions. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Subject heading | Computer security |
9 (RLIN) | 1346 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Subject heading | Computer security--Management |
9 (RLIN) | 1863 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Subject heading | Computer science |
9 (RLIN) | 1357 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan (e.g. reference copy) | Home library | Current library | Date acquired | Inventory number | Total Checkouts | Full call number | Accession No | Date last seen | Item MRP (printed price) | Price effective from | Koha item type | Date last checked out |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Rashtriya Raksha University | Rashtriya Raksha University | 07/08/2014 | 05291 | 005.8 BIS | 5291 | 02/09/2021 | 680.00 | 02/09/2021 | Books | ||||||
Dewey Decimal Classification | Rashtriya Raksha University | Rashtriya Raksha University | 22/09/2014 | 05365 | 1 | 005.8 BIS | 5365 | 28/11/2022 | 680.00 | 02/09/2021 | Books | 16/11/2022 | ||||
Dewey Decimal Classification | Rashtriya Raksha University | Rashtriya Raksha University | 22/09/2014 | 05366 | 2 | 005.8 BIS | 5366 | 09/10/2023 | 680.00 | 02/09/2021 | Books | 25/09/2023 | ||||
Dewey Decimal Classification | Rashtriya Raksha University | Rashtriya Raksha University | 22/09/2014 | 05367 | 005.8 BIS | 5367 | 02/09/2021 | 680.00 | 02/09/2021 | Books | ||||||
Dewey Decimal Classification | Rashtriya Raksha University | Rashtriya Raksha University | 22/09/2014 | 05368 | 1 | 005.8 BIS | 5368 | 29/05/2023 | 680.00 | 02/09/2021 | Books | 03/02/2023 |