Java and the Java virtual machine : (Record no. 20229)

000 -LEADER
fixed length control field 01838nam a2200253 4500
001 - CONTROL NUMBER
control field vtls002165860
003 - CONTROL NUMBER IDENTIFIER
control field MY-SjTCS
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200306153415.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 110218s2001 gw a 001 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 3540420886
039 #9 - LEVEL OF BIBLIOGRAPHIC CONTROL AND CODING DETAIL [OBSOLETE]
Level of rules in bibliographic description 201909181736
Level of effort used to assign nonsubject heading access points ummi
Level of effort used to assign subject headings 201102181757
Level of effort used to assign classification VLOAD
-- 200407271927
-- VLOAD
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.133
Item number STA
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Stark, Robert F.,
Dates associated with a name 1963-
9 (RLIN) 13289
245 10 - TITLE STATEMENT
Title Java and the Java virtual machine :
Remainder of title definition, verification, validation /
Statement of responsibility, etc. Robert F. Stark, Joachim Schmid, Egon Borger.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Berlin :
Name of publisher, distributor, etc. Springer,
Date of publication, distribution, etc. c2001
300 ## - PHYSICAL DESCRIPTION
Extent x, 381 p. :
Other physical details ill. ;
Dimensions 25 cm.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Introduction. - 2. Abstract State Machines. Pt. 1. Java. 3. The imperative core Java of Java. 4. The procedural extension Java of Java. 5. The object-oriented extension Java of Java. 6. The exception-handling extension Java of Java. 7. The concurrent extension Java of Java. 8. Java is type safe. - Pt. II. Compilation of Java: The Trustful JVM. 9. The JVM submachine. 10. The procedural extension JVM of JVM. 11. The object-oriented extension JVM of JVM. 12. The exception-handling extension JVM of JVM. 13. Executing the JVM. 14. Correctness of the compiler. _ Pt. III. Bytecode Verification: The Secure JVM. 15 The defensive virtual machine. 16. Bytecode type assignments. 17. The diligent virtual machine. 18. The dynamic virtual machine. - Appendix. A: Executable Models. - Appendix. B: Java. - Appendix. C: JVM. - Appendix. D: Compiler. - References. - List of Figures. - List of Tables. - Index.
525 ## - SUPPLEMENT NOTE
Supplement note Accompanied by 1 computer optical disc (4 3/4 in.)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Java (Computer program language)
9 (RLIN) 17415
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Virtual computer systems.
9 (RLIN) 13290
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Borger, Egon,
Dates associated with a name 1946-
Relator term (j.a.)
9 (RLIN) 200149
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Schmid, Joachim,
Dates associated with a name 1974-
Relator term (j.a.)
9 (RLIN) 200150
920 ## - Programme
Programme DIPIT : 540073, CD540073
999 ## - SYSTEM CONTROL NUMBERS (KOHA)
Koha biblionumber 20229
Koha biblioitemnumber 20229
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Permanent Location Current Location Date acquired Total Checkouts Barcode Date last seen Date last checked out Copy number Koha item type Public note
          Please fill up online form at https://taylorslibrary.taylors.edu.my/services/external_storage1 Taylor's Library-TU TU External Storage-LCS 2004-07-27   1000116781 2019-12-05 2010-04-20 1 Accompanying Material (Media Resource) SOCIT,15010,03,GR