Information security : (Record no. 7946)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02424cam a22003858i 4500 |
| 001 - CONTROL NUMBER | |
| control field | 22101755 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | n |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20250929135814.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 210625s2022 nju b 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
| LC control number | 2021031566 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781119505907 |
| Qualifying information | (hardback) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| Canceled/invalid ISBN | 9781119505891 |
| Qualifying information | (adobe pdf) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| Canceled/invalid ISBN | 9781119505884 |
| Qualifying information | (epub) |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | 22101755 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | DLC |
| Language of cataloging | eng |
| Description conventions | rda |
| Transcribing agency | DLC |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | pcc |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER | |
| Classification number | QA76.9.A25 |
| Item number | S69 2022 |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 S69 2022 |
| Edition number | 23 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Stamp, Mark, |
| Relator term | author. |
| 245 10 - TITLE STATEMENT | |
| Title | Information security : |
| Remainder of title | principles and practice / |
| Statement of responsibility, etc. | Mark Stamp, San Jose State University, San Jose, California. |
| 250 ## - EDITION STATEMENT | |
| Edition statement | Third edition. |
| 263 ## - PROJECTED PUBLICATION DATE | |
| Projected publication date | 2111 |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
| Place of production, publication, distribution, manufacture | Hoboken, NJ : |
| Name of producer, publisher, distributor, manufacturer | Wiley, |
| Date of production, publication, distribution, manufacture, or copyright notice | 2022. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 430 pages 23 cm. |
| 336 ## - CONTENT TYPE | |
| Content type term | text |
| Content type code | txt |
| Source | rdacontent |
| 337 ## - MEDIA TYPE | |
| Media type term | unmediated |
| Media type code | n |
| Source | rdamedia |
| 338 ## - CARRIER TYPE | |
| Carrier type term | volume |
| Carrier type code | nc |
| Source | rdacarrier |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc. note | Includes bibliographical references and index. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | "Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Working knowledge is required of aspects of cryptography such as classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis. Experts must also use access control techniques like authentication and authorization, password-based security, ACLs and capabilities, multilevel security and compartments, covert channels and inference control. Among the various protocols used in information security are simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, and GSM. Software can create problems including flaws and malware, buffer overflows, viruses and worms, and also solve them using tools such as malware detection, digital rights management, secure software development, and operating systems security"-- |
| Assigning source | Provided by publisher. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer security. |
| 776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
| Relationship information | Online version: |
| Main entry heading | Stamp, Mark. |
| Title | Information security |
| Edition | Third edition. |
| Place, publisher, and date of publication | Hoboken, NJ : Wiley, 2022 |
| International Standard Book Number | 9781119505891 |
| Record control number | (DLC) 2021031567 |
| 906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) | |
| a | 7 |
| b | cbc |
| c | orignew |
| d | 1 |
| e | ecip |
| f | 20 |
| g | y-gencatlg |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | English Book |
| Suppress in OPAC | No |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Date acquired | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type | Copy number |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | CENTRAL | CENTRAL | 10/01/2025 | 005.8 S69 2022 | 1000000020300 | 10/01/2025 | 10/01/2025 | English Book | ||||||
| Dewey Decimal Classification | CENTRAL | WOMEN | 11/25/2025 | 005.8 S69 2022 | 1000000016252 | 11/25/2025 | 11/25/2025 | English Book | C2 |
