Computer security : (Record no. 27607)

000 -LEADER
fixed length control field 02187cam a2200253 4500
001 - CONTROL NUMBER
control field vtls002661060
003 - CONTROL NUMBER IDENTIFIER
control field MY-SjTCS
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200306154337.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 110218s2003 mau b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0201440997 (hbk.)
039 #9 - LEVEL OF BIBLIOGRAPHIC CONTROL AND CODING DETAIL [OBSOLETE]
Level of rules in bibliographic description 201706141117
Level of effort used to assign nonsubject heading access points ummi
Level of effort used to assign subject headings 201102181309
Level of effort used to assign classification VLOAD
Level of effort used to assign subject headings 200410191814
Level of effort used to assign classification kusuma
-- 200407271949
-- VLOAD
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number BIS
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Bishop, Matthew.
9 (RLIN) 210497
245 10 - TITLE STATEMENT
Title Computer security :
Remainder of title art and science /
Statement of responsibility, etc. Matt Bishop
246 18 - VARYING FORM OF TITLE
Title proper/short title Computer security
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boston, Mass. :
Name of publisher, distributor, etc. Addison-Wesley,
Date of publication, distribution, etc. c2003
300 ## - PHYSICAL DESCRIPTION
Extent xli, 1084 p. :
Other physical details ill. ;
Dimensions 25 cm.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Preface. - Pt. 1. Introduction. Ch. 1. An Overview of Computer Security. - Pt. 2. Foundations. Ch. 2. Access Control Matrix. Ch. 3. Foundation Results. - Pt. 3. Policy. Ch. 4. Security Policies. Ch. 5. Confidentiality Policies. Ch. 6. Integrity Policies. Ch. 7. Hybrid Policies. Ch. 8. Noninterference and Policy Composition. - Pt. 4. Implementation I: Cryptography. Ch. 9. Basic Cryptography. Ch. 10. Key Management. Ch. 11. Cipher Techniques. Ch. 12. Authentication. - Pt. 5. Implementation II : Systems. Ch. 14. Representing Identity. Ch. 15. Access Control Mechanisms. Ch. 16. Information Flow. Ch. 17. Confinement Problem. - Pt. 6. Assurance : Contributed by Elisabeth Sullivan. Ch. 19. Building Systems With Assurance. Ch. 20. Formal Methods. Ch. 21. Evaluating Systems. - Pt. 7. Special Topics. Ch. 22. Malicious Logic. Ch. 23. Vulnerability Analysis. Ch. 24. Auditing. Ch. 25. Intrusion Detection. - Pt. 8. Practicum. Ch. 26. Network Security. Ch. 27. System Security. Ch. 28. User Security. Ch. 29. Program Security. - Pt. 9. End Matter. Ch. 30. Lattices. Ch. 31. The Extended Euclidean Algorithm. Ch. 32. Entropy and Uncertainty. Ch. 33. Virtual Machines. Ch. 34. Symbolic Logic. Ch. 35. Example Academic Security Policy. - Bibliography. - Index.
590 ## - LOCAL NOTE (RLIN)
Local note Computer programming, programs & data
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
9 (RLIN) 7460
920 ## - Programme
Programme CIT(DIP) : 540920
921 ## - Programme
Programme GEN : 103963
922 ## - Programme
Programme CIT (RMIT) : 546617
999 ## - SYSTEM CONTROL NUMBERS (KOHA)
Koha biblionumber 27607
Koha biblioitemnumber 27607
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Date acquired Total Checkouts Barcode Date last seen Date last checked out Copy number Uniform Resource Identifier Koha item type Public note
          Taylor's Library-TU Taylor's Library-TU 2004-10-19 7 5000040355 2023-12-13 2023-12-01 1 Floor 3, Shelf 1 , Side 1, TierNo 1, BayNo 7 Main Collection SOCIT,15009,03,GR