Computer security : (Record no. 1979)

000 -LEADER
fixed length control field 02084cam a22003014a 4500
001 - CONTROL NUMBER
control field u3383
003 - CONTROL NUMBER IDENTIFIER
control field SA-PMU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210418123208.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 020719s2003 maua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2002026219
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency BAKER
-- NLGGC
-- YDXCP
-- OCLCQ
-- BTCTA
-- LVB
-- UQ1
-- OCLCG
-- IG#
-- MNY
-- DEBBG
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0201440997 (alk. paper)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780201440997 (alk. paper)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)50251943
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number B56 2003
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 21
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Bishop, Matt
Fuller form of name (Matthew A.)
245 10 - TITLE STATEMENT
Title Computer security :
Remainder of title art and science /
Statement of responsibility, etc. Matt Bishop.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boston :
Name of publisher, distributor, etc. Addison-Wesley,
Date of publication, distribution, etc. 2003.
300 ## - PHYSICAL DESCRIPTION
Extent xli, 1084 p. :
Other physical details ill. ;
Dimensions 24 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Pt. 1. Introduction -- 1. An overview of computer security -- Pt. 2. Foundations -- 2. Access control matrix -- 3. Foundational results -- Pt. 3. Policy -- 4. Security policies -- 5. Confidentiality policies -- 6. Integrity policies -- 7. Hybrid policies -- 8. Noninterference and policy composition -- Pt. 4. Implementation I: cryptography -- 9. Basic cryptography -- 10. Key management -- 11. Cipher techniques -- 12. Authentication -- Pt. 5. Implementation II: systems -- 13. Design principles -- 14. Representing identity -- 15. Access control mechanisms -- 16. Information flow -- 17. Confinement problem -- Pt. 6. Assurance / by Elisabeth Sullivan -- 18. Introduction to assurance -- 19. Building systems with assurance -- 20. Formal methods -- 21. Evaluating systems -- Pt. 7. Special topics -- 22. Malicious logic -- 23. Vulnerability analysis -- 24. Auditing -- 25. Intrusion detection -- Pt. 8. Practicum -- 26. Network security -- 27. System security -- 28. User security -- 29. Program security -- Pt. 9. End matter -- 30. Lattices -- 31. The extended Euclidean algorithm -- 32. Entropy and uncertainty -- 33. Virtual machines -- 34. Symbolic logic -- 35. Example academic security policy.
596 ## -
-- 1 2
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
994 ## -
-- Z0
-- SUPMU
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type Public note
          Female Library Female Library 04/18/2021   QA76.9 .A25 B56 2003 51952000082330 04/15/2021 1 04/15/2021 Books STACKS
          Main Library Main Library 04/18/2021   QA76.9 .A25 B56 2003 51952000062301 04/15/2021 1 04/15/2021 Books STACKS