Access control systems : (Record no. 12068)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01011cam a22002294a 4500 |
001 - CONTROL NUMBER | |
control field | 14011703 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200907095740.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 050622s2006 nyua b 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0387004459 (alk. paper) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0387277161 (ebook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780387004457 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780387277165 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9788181289100 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | DLC |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 22 |
Item number | M583 |
245 10 - TITLE STATEMENT | |
Title | Access control systems : |
Remainder of title | security, identity management and trust models |
Statement of responsibility, etc | / Messaoud Benantar. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | New York : |
Name of publisher, distributor, etc | Springer Science+Business Media, |
Date of publication, distribution, etc | 2008 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxi, 261 p. : |
Other physical details | ill. ; |
Dimensions | 25 cm. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Security measures. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Books |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Foundations of Security and Access Control in Computing.- to Identity-Management Models.- Elements of Trust Paradigms in Computing.- Mandatory-Access-Control Model.- Discretionary-Access Control and the Access-Matrix Model.- The Take-Grant Protection Model.- The Schematic-Protection Model.- Role-Based Access Control<br/><br/> |
Withdrawn status | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|
UE-Central Library | UE-Central Library | 12.11.2018 | U.E.23969 | 005.8 M583 | T9390 | 12.11.2018 | 12.11.2018 | Books | |||
UE-Central Library | UE-Central Library | 14.11.2018 | U.E.24760 | 005.8 M583 | T9814 | 14.11.2018 | 14.11.2018 | Books |