000 -LEADER |
fixed length control field |
02084cam a22003014a 4500 |
001 - CONTROL NUMBER |
control field |
u3383 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
SA-PMU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20210418123208.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
020719s2003 maua b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2002026219 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Transcribing agency |
DLC |
Modifying agency |
BAKER |
-- |
NLGGC |
-- |
YDXCP |
-- |
OCLCQ |
-- |
BTCTA |
-- |
LVB |
-- |
UQ1 |
-- |
OCLCG |
-- |
IG# |
-- |
MNY |
-- |
DEBBG |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0201440997 (alk. paper) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780201440997 (alk. paper) |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)50251943 |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
Item number |
B56 2003 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
21 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Bishop, Matt |
Fuller form of name |
(Matthew A.) |
245 10 - TITLE STATEMENT |
Title |
Computer security : |
Remainder of title |
art and science / |
Statement of responsibility, etc. |
Matt Bishop. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Boston : |
Name of publisher, distributor, etc. |
Addison-Wesley, |
Date of publication, distribution, etc. |
2003. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xli, 1084 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Pt. 1. Introduction -- 1. An overview of computer security -- Pt. 2. Foundations -- 2. Access control matrix -- 3. Foundational results -- Pt. 3. Policy -- 4. Security policies -- 5. Confidentiality policies -- 6. Integrity policies -- 7. Hybrid policies -- 8. Noninterference and policy composition -- Pt. 4. Implementation I: cryptography -- 9. Basic cryptography -- 10. Key management -- 11. Cipher techniques -- 12. Authentication -- Pt. 5. Implementation II: systems -- 13. Design principles -- 14. Representing identity -- 15. Access control mechanisms -- 16. Information flow -- 17. Confinement problem -- Pt. 6. Assurance / by Elisabeth Sullivan -- 18. Introduction to assurance -- 19. Building systems with assurance -- 20. Formal methods -- 21. Evaluating systems -- Pt. 7. Special topics -- 22. Malicious logic -- 23. Vulnerability analysis -- 24. Auditing -- 25. Intrusion detection -- Pt. 8. Practicum -- 26. Network security -- 27. System security -- 28. User security -- 29. Program security -- Pt. 9. End matter -- 30. Lattices -- 31. The extended Euclidean algorithm -- 32. Entropy and uncertainty -- 33. Virtual machines -- 34. Symbolic logic -- 35. Example academic security policy. |
596 ## - |
-- |
1 2 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Books |
994 ## - |
-- |
Z0 |
-- |
SUPMU |