Information security : (Record no. 41888)

MARC details
000 -LEADER
fixed length control field nam a22 a 4500
001 - CONTROL NUMBER
control field 36977
003 - CONTROL NUMBER IDENTIFIER
control field BD-DhAAL
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200209112711.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 090220t2011 njuad b 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780470626399 (hardback)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency DLC
-- BD-DhAAL
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Stamp, Mark
9 (RLIN) 39199
245 10 - TITLE STATEMENT
Title Information security :
Remainder of title principles and practice /
Statement of responsibility, etc Mark Stamp.
250 ## - EDITION STATEMENT
Edition statement second edition
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Hoboken, NJ :
Name of publisher, distributor, etc Wiley,
Date of publication, distribution, etc c2011.
300 ## - PHYSICAL DESCRIPTION
Extent xxi, 584 pages :
Other physical details illustrations ;
Dimensions 25 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references (pages 531-571) and index.
520 ## - SUMMARY, ETC.
Summary, etc "Featuring a wide array of new information on the most current security topics, this book provides everything readers need to tackle any information security challenge. Focusing on cryptography, access control, protocols and software, this Second Edition features a greatly expanded set of homework problems; an appendix that covers necessary background information, like networking basics; a solutions manual and a comprehensive set of classroom-tested PowerPoint slides; and many new figures, tables, and graphs to clarify complex topics and problems. Students and instructors in information technology, computer science, and engineering, as well as professionals in these fields will depend on this text"--
526 ## - STUDY PROGRAM INFORMATION NOTE
Program name CSE
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
9 (RLIN) 39200
Topical term or geographic name as entry element COMPUTERS / Security / General
Source of heading or term bisacsh.
9 (RLIN) 39201
Topical term or geographic name as entry element Computer science
9 (RLIN) 39202
852 ## - LOCATION/CALL NUMBER
Location Ayesha Abed Library
Shelving location General Stacks
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Total Renewals Full call number Barcode Date last seen Date last borrowed Copy number Cost, replacement price Price effective from Koha item type Checked out
    Dewey Decimal Classification     Ayesha Abed Library Ayesha Abed Library General Stacks 04/02/2020 Trim Education 9865.00 5 18 005.8 STA 3010036978 02/09/2024 12/05/2024 2 9865.00 04/02/2020 Book  
    Dewey Decimal Classification     Ayesha Abed Library Ayesha Abed Library General Stacks 04/02/2020 Trim Education 9865.00 8 75 005.8 STA 3010036979 12/05/2024 12/05/2024 3 9865.00 04/02/2020 Book 06/10/2024
    Dewey Decimal Classification     Ayesha Abed Library Ayesha Abed Library General Stacks 04/02/2020 Trim Education 9865.00 3 7 005.8 STA 3010036977 23/06/2024 17/01/2024 1 9865.00 04/02/2020 Book