Computer science security : (Record no. 86308)

000 -LEADER
fixed length control field 01521nam a22003617a 4500
003 - CONTROL NUMBER IDENTIFIER
control field CITU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20231212120949.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m |o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |n|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 231201b ||||| |||| 00| 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2022932502
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781786307552 (print)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781394163847 (online)
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
100 1# - MAIN ENTRY--PERSONAL NAME
Preferred name for the person Zaidoun, Ameur Salem
Relator term author
245 10 - TITLE STATEMENT
Title Computer science security :
Remainder of title concepts and tools /
Statement of responsibility, etc by Ameur Salem Zaidoun
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Hoboken, NJ :
Name of publisher, distributor, etc John Wiley & Sons, Inc.,
Date of publication, distribution, etc [2022]
264 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Date of publication, distribution, etc © 2022
300 ## - PHYSICAL DESCRIPTION
Extent xvi-182 pages :
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
504 0# - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - CONTENTS
Formatted contents note 1 General Concepts in Security -- 2 Security Weaknesses -- 3 Authentication Techniques and Tools -- 4 Techniques and Tools for Controlling Access, ACL and Firewalls -- 5 Techniques and Tools for Detecting Intrusions -- 6 Techniques and Tools for Encryption, IPSec and VPN -- 7 New Challenges and Trends in Security, SDN and IoT -- 8 Security Management
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Database security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Security systems.
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
856 ## - ELECTRONIC LOCATION AND ACCESS
Link text Full text is available at Wiley Online Library (Click here to view)
Uniform Resource Identifier https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847
942 ## - ADDED ENTRY ELEMENTS
Source of classification or shelving scheme
Item type EBOOK
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Use restrictions Not for loan Permanent Location Current Location Shelving location Date acquired Source of acquisition Inventory number Full call number Barcode Date last seen Price effective from Item type
        In Process   COLLEGE LIBRARY COLLEGE LIBRARY LIC Gateway 2023-12-01 Purchased 52893 005.8 Z136 2022 52893 2023-12-01 2023-12-01 EBOOK