Islamic University of Technology OPAC

Information security : (Record no. 7811)

MARC details
000 -LEADER
fixed length control field 01820cam a2200325 a 4500
001 - CONTROL NUMBER
control field 16511057
003 - CONTROL NUMBER IDENTIFIER
control field BD-GzIUT
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230924192425.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 101020s2011 njua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2010045221
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780470626399 (hardback)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number S69 2011
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
084 ## - OTHER CLASSIFICATION NUMBER
Classification number COM053000
Number source bisacsh
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Stamp, Mark.
245 10 - TITLE STATEMENT
Title Information security :
Remainder of title principles and practice /
Statement of responsibility, etc. Mark Stamp.
250 ## - EDITION STATEMENT
Edition statement 2nd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Hoboken, NJ :
Name of publisher, distributor, etc. Wiley,
Date of publication, distribution, etc. c2011.
300 ## - PHYSICAL DESCRIPTION
Extent xxi, 584 p. :
Other physical details ill. ;
Dimensions 25 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (p. 531-571) and index.
520 ## - SUMMARY, ETC.
Summary, etc. "Featuring a wide array of new information on the most current security topics, this book provides everything readers need to tackle any information security challenge. Focusing on cryptography, access control, protocols and software, this Second Edition features a greatly expanded set of homework problems; an appendix that covers necessary background information, like networking basics; a solutions manual and a comprehensive set of classroom-tested PowerPoint slides; and many new figures, tables, and graphs to clarify complex topics and problems. Students and instructors in information technology, computer science, and engineering, as well as professionals in these fields will depend on this text"--
Assigning source Provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Security / General
Source of heading or term bisacsh.
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781118027974">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118027974</a>
Link text Full Text Available
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type E-Books
Suppress in OPAC No
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Date last seen Uniform Resource Identifier Price effective from Koha item type
    Dewey Decimal Classification     IUT Library IUT Library Virtual (E-Books) 09/24/2023   09/24/2023 https://onlinelibrary.wiley.com/doi/epdf/10.1002/9781118027974 09/24/2023 E-Books

© 2024 | Library, Islamic University of Technology