000 -LEADER |
fixed length control field |
02187cam a2200253 4500 |
001 - CONTROL NUMBER |
control field |
vtls002661060 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
MY-SjTCS |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20200306154337.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
110218s2003 mau b 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0201440997 (hbk.) |
039 #9 - LEVEL OF BIBLIOGRAPHIC CONTROL AND CODING DETAIL [OBSOLETE] |
Level of rules in bibliographic description |
201706141117 |
Level of effort used to assign nonsubject heading access points |
ummi |
Level of effort used to assign subject headings |
201102181309 |
Level of effort used to assign classification |
VLOAD |
Level of effort used to assign subject headings |
200410191814 |
Level of effort used to assign classification |
kusuma |
-- |
200407271949 |
-- |
VLOAD |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
BIS |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Bishop, Matthew. |
9 (RLIN) |
210497 |
245 10 - TITLE STATEMENT |
Title |
Computer security : |
Remainder of title |
art and science / |
Statement of responsibility, etc. |
Matt Bishop |
246 18 - VARYING FORM OF TITLE |
Title proper/short title |
Computer security |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Boston, Mass. : |
Name of publisher, distributor, etc. |
Addison-Wesley, |
Date of publication, distribution, etc. |
c2003 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xli, 1084 p. : |
Other physical details |
ill. ; |
Dimensions |
25 cm. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Preface. - Pt. 1. Introduction. Ch. 1. An Overview of Computer Security. - Pt. 2. Foundations. Ch. 2. Access Control Matrix. Ch. 3. Foundation Results. - Pt. 3. Policy. Ch. 4. Security Policies. Ch. 5. Confidentiality Policies. Ch. 6. Integrity Policies. Ch. 7. Hybrid Policies. Ch. 8. Noninterference and Policy Composition. - Pt. 4. Implementation I: Cryptography. Ch. 9. Basic Cryptography. Ch. 10. Key Management. Ch. 11. Cipher Techniques. Ch. 12. Authentication. - Pt. 5. Implementation II : Systems. Ch. 14. Representing Identity. Ch. 15. Access Control Mechanisms. Ch. 16. Information Flow. Ch. 17. Confinement Problem. - Pt. 6. Assurance : Contributed by Elisabeth Sullivan. Ch. 19. Building Systems With Assurance. Ch. 20. Formal Methods. Ch. 21. Evaluating Systems. - Pt. 7. Special Topics. Ch. 22. Malicious Logic. Ch. 23. Vulnerability Analysis. Ch. 24. Auditing. Ch. 25. Intrusion Detection. - Pt. 8. Practicum. Ch. 26. Network Security. Ch. 27. System Security. Ch. 28. User Security. Ch. 29. Program Security. - Pt. 9. End Matter. Ch. 30. Lattices. Ch. 31. The Extended Euclidean Algorithm. Ch. 32. Entropy and Uncertainty. Ch. 33. Virtual Machines. Ch. 34. Symbolic Logic. Ch. 35. Example Academic Security Policy. - Bibliography. - Index. |
590 ## - LOCAL NOTE (RLIN) |
Local note |
Computer programming, programs & data |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
9 (RLIN) |
7460 |
920 ## - Programme |
Programme |
CIT(DIP) : 540920 |
921 ## - Programme |
Programme |
GEN : 103963 |
922 ## - Programme |
Programme |
CIT (RMIT) : 546617 |
999 ## - SYSTEM CONTROL NUMBERS (KOHA) |
Koha biblionumber |
27607 |
Koha biblioitemnumber |
27607 |