Computer security / (Record no. 4783)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01642nam a2200217Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250520094851.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 250520s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 471978442 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA 76.9.A25 .G65 1999 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Gollmann, Dieter. |
Relator term | author |
245 #0 - TITLE STATEMENT | |
Title | Computer security / |
Statement of responsibility, etc. | Dieter Gollmann |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Chichester, England : |
Name of publisher, distributor, etc. | Wiley, |
Date of publication, distribution, etc. | c1999 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xv, 320 pages : |
Other physical details | illustrations ; |
Dimensions | 24 cm. |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes bibliographical references (pages 307-313) and index. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Fundamentals. Access Control. Security Models. Microprocessors. Operating Systems (Including Case Studies). Networks Security. Distributed System Security. Security APIs. Database Security. Security Evaluation. Attacks (Including Viruses). |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Starting with basic definitions and concepts, the first section of the book goes on to outline the mechanisms located at the heart of the computer system, mechanisms which provide the basis for techniques used in all other branches of the system. The second section examines the security features found in operating systems such as UNIX and Windows NT, catalogues security breaches, and introduces the topic of security evaluation. A third section is devoted to issues associated with distributed systems, such as network - and Web - security and considers cryptography as an essential technique for such environments. The final section of the book is constructed around database security, discussing problems in multi-level security, and examining security problems in specific settings. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTER SECURITY |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Total checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Library of Congress Classification | Gen. Ed. - CCIT | LRC - Main | National University - Manila | General Circulation | 11/19/2011 | Reaccessioned | GC QA 76.9.A25 .G65 1999 | NULIB000002542 | 05/20/2025 | c.1 | 05/20/2025 | Books |