Computer security / (Record no. 4783)

MARC details
000 -LEADER
fixed length control field 01642nam a2200217Ia 4500
003 - CONTROL NUMBER IDENTIFIER
control field NULRC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250520094851.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250520s9999 xx 000 0 und d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 471978442
040 ## - CATALOGING SOURCE
Transcribing agency NULRC
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA 76.9.A25 .G65 1999
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Gollmann, Dieter.
Relator term author
245 #0 - TITLE STATEMENT
Title Computer security /
Statement of responsibility, etc. Dieter Gollmann
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Chichester, England :
Name of publisher, distributor, etc. Wiley,
Date of publication, distribution, etc. c1999
300 ## - PHYSICAL DESCRIPTION
Extent xv, 320 pages :
Other physical details illustrations ;
Dimensions 24 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (pages 307-313) and index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Fundamentals. Access Control. Security Models. Microprocessors. Operating Systems (Including Case Studies). Networks Security. Distributed System Security. Security APIs. Database Security. Security Evaluation. Attacks (Including Viruses).
520 ## - SUMMARY, ETC.
Summary, etc. Starting with basic definitions and concepts, the first section of the book goes on to outline the mechanisms located at the heart of the computer system, mechanisms which provide the basis for techniques used in all other branches of the system. The second section examines the security features found in operating systems such as UNIX and Windows NT, catalogues security breaches, and introduces the topic of security evaluation. A third section is devoted to issues associated with distributed systems, such as network - and Web - security and considers cryptography as an essential technique for such environments. The final section of the book is constructed around database security, discussing problems in multi-level security, and examining security problems in specific settings.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTER SECURITY
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Total checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Library of Congress Classification     Gen. Ed. - CCIT LRC - Main National University - Manila General Circulation 11/19/2011 Reaccessioned   GC QA 76.9.A25 .G65 1999 NULIB000002542 05/20/2025 c.1 05/20/2025 Books