000 -LEADER |
fixed length control field |
01521nam a22003617a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
CITU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20231212120949.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION |
fixed length control field |
m |o d | |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr |n||||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
231201b ||||| |||| 00| 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2022932502 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781786307552 (print) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781394163847 (online) |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
eng |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Preferred name for the person |
Zaidoun, Ameur Salem |
Relator term |
author |
245 10 - TITLE STATEMENT |
Title |
Computer science security : |
Remainder of title |
concepts and tools / |
Statement of responsibility, etc |
by Ameur Salem Zaidoun |
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Hoboken, NJ : |
Name of publisher, distributor, etc |
John Wiley & Sons, Inc., |
Date of publication, distribution, etc |
[2022] |
264 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Date of publication, distribution, etc |
© 2022 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xvi-182 pages : |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
computer |
Media type code |
c |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Carrier type code |
cr |
Source |
rdacarrier |
504 0# - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
505 0# - CONTENTS |
Formatted contents note |
1 General Concepts in Security -- 2 Security Weaknesses -- 3 Authentication Techniques and Tools -- 4 Techniques and Tools for Controlling Access, ACL and Firewalls -- 5 Techniques and Tools for Detecting Intrusions -- 6 Techniques and Tools for Encryption, IPSec and VPN -- 7 New Challenges and Trends in Security, SDN and IoT -- 8 Security Management |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer science |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Database security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Security systems. |
655 #0 - INDEX TERM--GENRE/FORM |
Genre/form data or focus term |
Electronic books. |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Link text |
Full text is available at Wiley Online Library (Click here to view) |
Uniform Resource Identifier |
https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847 |
942 ## - ADDED ENTRY ELEMENTS |
Source of classification or shelving scheme |
|
Item type |
EBOOK |