Library Logo

Information security : (Record no. 1290)

000 -LEADER
fixed length control field 01694cam a2200325 a 4500
001 - CONTROL NUMBER
control field 9345094
003 - CONTROL NUMBER IDENTIFIER
control field BD-DhUL
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20150129210834.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr n
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 101020s2011 njua sb 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780470626399 (hardback)
035 ## - SYSTEM CONTROL NUMBER
System control number (WaSeSS)ssj0000523419
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency DLC
-- WaSeSS
-- BD-DhUL
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number S69 2011
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
Item number STI
084 ## - OTHER CLASSIFICATION NUMBER
Classification number COM053000
Number source bisacsh
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Stamp, Mark.
210 10 - ABBREVIATED TITLE
Abbreviated title Information security
245 10 - TITLE STATEMENT
Title Information security :
Remainder of title principles and practice /
Statement of responsibility, etc. Mark Stamp.
250 ## - EDITION STATEMENT
Edition statement 2nd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. Hoboken, NJ :
Name of publisher, distributor, etc. Wiley,
Date of publication, distribution, etc. c2011.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references (p. 531-571) and index.
506 ## - RESTRICTIONS ON ACCESS NOTE
Terms governing access License restrictions may limit access.
520 ## - SUMMARY, ETC.
Summary, etc. "Featuring a wide array of new information on the most current security topics, this book provides everything readers need to tackle any information security challenge. Focusing on cryptography, access control, protocols and software, this Second Edition features a greatly expanded set of homework problems; an appendix that covers necessary background information, like networking basics; a solutions manual and a comprehensive set of classroom-tested PowerPoint slides; and many new figures, tables, and graphs to clarify complex topics and problems. Students and instructors in information technology, computer science, and engineering, as well as professionals in these fields will depend on this text"--
Assigning source Provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS / Security / General
Source of heading or term bisacsh.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Books
Holdings
Price effective from Date last seen Permanent Location Not for loan Date acquired Source of classification or shelving scheme Koha item type Lost status Cost, normal purchase price Withdrawn status Source of acquisition Collection code Damaged status Shelving location Barcode Current Location Full call number
2014-08-082014-08-08Dhaka University Science Library 2012-11-17 Books 98.96 PurchaseNon Fiction General Stacks476264Dhaka University Science Library005.8 STI
Last Updated on September 15, 2019
© Dhaka University Library. All Rights Reserved|Staff Login