MARC details
000 -LEADER |
fixed length control field |
02933nam a2200253Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250520100703.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250520s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780133773927 |
040 ## - CATALOGING SOURCE |
Transcribing agency |
NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA 76.9.A25 .S73 2015 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Stallings, William |
Relator term |
author |
245 #0 - TITLE STATEMENT |
Title |
Computer security : |
Remainder of title |
principles and practice / |
Statement of responsibility, etc. |
William Stallings and Lawrie Brown |
250 ## - EDITION STATEMENT |
Edition statement |
Third Edition |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
New Jersey : |
Name of publisher, distributor, etc. |
Pearson Education, |
Date of publication, distribution, etc. |
c2015 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xix, 820 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm. |
365 ## - TRADE PRICE |
Price amount |
USD233.43 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
1. Overview -- Part 1. Computer security technology and principles -- 2. Cryptographic tools -- 3. User authentication -- 4. Access control -- 5. Database and cloud security -- 6. Malicious software -- 7. Denial-of-service attacks -- 8. Intrusion detection -- 9. Firewalls and intrusion prevention systems -- Part 2. Software security and trusted systems -- 10. Buffer overflow -- 11. Software security -- 12. Operating system security -- 13. Trusted computing and multilevel security -- Part 3. Management issues -- 14. IT security management and risk assessment -- 15. IT security controls, plans and procedures -- 16. Physical and infrastructure security -- 17. Human resources security -- 18.Security auditing -- 19.legal and ethical aspects -- Part 4. Cryptographic algorithms -- 20. Symmetric encryption and message confidentiality -- 21. Public-key cryptography and message authentication -- Part 5. Network security -- 22. Internet security protocols and standards -- 23. Internet authentication applications -- 24. Wireless network security. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Computer Security: Principles and Practice, Third Edition, is ideal for courses in Computer/Network Security. It also provides a solid, up-to-date reference or self-study tutorial for system engineers, programmers, system managers, network managers, product marketing personnel, system support specialists. In recent years, the need for education in computer security and related topics has grown dramatically―and is essential for anyone studying Computer Science or Computer Engineering. This is the only text available to provide integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. In addition to an extensive pedagogical program, the book provides unparalleled support for both research and modeling projects, giving students a broader perspective. It covers all security topics considered Core in the EEE/ACM Computer Science Curriculum. This textbook can be used to prep for CISSP Certification, and includes in-depth coverage of Computer Security, Technology and Principles, Software Security, Management Issues, Cryptographic Algorithms, Internet Security and more. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
COMPUTER SECURITY |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Brown, Lawrie |
Relator term |
co-author |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Books |