Welcome to UE Central Library

Keep Smiling

Computer security : (Record no. 19495)

MARC details
000 -LEADER
fixed length control field 01636cam a2200265 i 4500
001 - CONTROL NUMBER
control field 18083047
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200602111538.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140327s2015 maua b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780133773927
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0133773922
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781292066172 (pbk)
040 ## - CATALOGING SOURCE
Transcribing agency DLC
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
Item number St18
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Stallings, William,
245 10 - TITLE STATEMENT
Title Computer security :
Remainder of title principles and practice /
Statement of responsibility, etc William Stallings, Lawrie Brown, UNSW Canberra at the Australian Defence Force Academy.
250 ## - EDITION STATEMENT
Edition statement 3rd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Boston :
Name of publisher, distributor, etc Pearson Education,
Date of publication, distribution, etc 2015
300 ## - PHYSICAL DESCRIPTION
Extent 840 p. :
Other physical details illustrations ;
Dimensions 24 cm
490 0# - SERIES STATEMENT
Series statement The William Stallings books on computer and data communications technology
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Brown, Lawrie,
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note overview 31;<br/>Cryptographic tools; <br/>user authentication; <br/>access control; <br/>database and cloud security; <br/>malicious software; <br/>denial of service attacks; <br/>intrusion detection; <br/>firewalls and intrusion prevention systems; <br/>buffer overflow; <br/>software security; <br/>operating system security; <br/>trusted computing and multilevel security; <br/>IT security management and risk assessment; <br/>IT security controls, plans, and procedures; <br/>physical and infrastructure security; <br/>human resources security; <br/>security auditing; <br/>legal and ethical aspects; <br/>symmetric encryption and message confidentiality; <br/>public key cryptography and message authentication; <br/>internet security protocols and standards; <br/>internet authentication applications;<br/>wireless network security <br/><br/>
Holdings
Withdrawn status Damaged status Not for loan Home library Current library Date acquired Source of acquisition Full call number Barcode Date last seen Price effective from Koha item type
      UE-Central Library UE-Central Library 17.12.2019 U.E. 005.8 St18 T12982 07.12.2023 17.12.2019 Books
Copyright © 2023, University of Education, Lahore. All Rights Reserved.
Email:centrallibrary@ue.edu.pk