information security principles and practice / (Record no. 57938)

000 -LEADER
fixed length control field 03202cam a22003494a 4500
001 - CONTROL NUMBER
control field 17021712
003 - CONTROL NUMBER IDENTIFIER
control field FUTML
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20170405101045.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 111026s2009 i a grb 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9788126519873
037 ## - ACCESSION NUMBER
Accession NUmber B-33247
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency FUTML
Modifying agency DLC
Language of cataloging English
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number M845 2012
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Shah, D.N.
9 (RLIN) 6555
245 02 - TITLE STATEMENT
Title information security principles and practice /
Statement of responsibility, etc. Seven N. Shah
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boca Raton :
Name of publisher, distributor, etc. CRC Press,
Date of publication, distribution, etc. c2012.
300 ## - PHYSICAL DESCRIPTION
Extent xx, 445 p. :
Other physical details ill. ;
Dimensions 23 cm.
490 0# - SERIES STATEMENT
Series statement Discrete mathematics and its applications
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes index.
520 ## - SUMMARY, ETC.
Summary, etc. "Preface The problems of information security is a truly multidisciplinary field of study, ranging from the methods of pure mathematics through computer and telecommunication sciences to social sciences. The intention of this multiauthored book is to o er an introduction to a wide set of topics in ICT information security, privacy and safety. Certainly, the aim has not been to present a complete treatment of this vast and expanding area of practical and theoretical knowledge. Rather, the hope is that the selected range of topics presented here may attract a wider audience of students and professionals than would each specialized topic by itself. Some of the information security topics contained in this book may be familiar turf for the reader already. However, the reader will likely also nd some new interesting topics presented here that are relevant to his or her professional needs, or for enhancement of knowledge and competence, or as an attractive starting point for further reading and in-depth studies. For instance, the book may provide an entrance and a guide to seek out more specialized courses available at universities and elsewhere, or as an inspiration for further work in projects and assignments. The start of this collection of information security topics goes back to a master level continuing education course that I organized in 2005, where more than 10 professors and researchers contributed from 6 di erent departments at the Norwegian University of Science and Technology. The topics included cryptography, hardware security, software security, communication and network security, intrusion detection systems, access policy and control, risk and vulnerability analysis, and security technology management"--
Assigning source Provided by publisher.
590 ## - LOCAL NOTE (RLIN)
Accession/Initials/Date of Entry B-33247/A.O.I./04/05/2017
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
9 (RLIN) 6556
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
9 (RLIN) 6366
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computers
General subdivision Access control.
9 (RLIN) 6557
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Computer Engineering.
Source of heading or term bisacsh
9 (RLIN) 3258
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Networking / General.
Source of heading or term bisacsh
9 (RLIN) 3257
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element TECHNOLOGY & ENGINEERING / Electrical.
Source of heading or term bisacsh
9 (RLIN) 2975
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Mj�lsnes, Stig F.
9 (RLIN) 6558
912 ## - Cataloguer Details
Cataloguer Details Omali Isa
Keyed by Omali Isa
Verified By Dogara Ladan
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Books,Booklets,Workbooks
949 ## - Local Processing Information
Book Location IBB Library Gidan-Kwano
Cutter Number .S52
Copy Number N nc 1
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Date acquired Source of acquisition Cost, normal purchase price Inventory number Full call number Barcode Date last seen Copy number Cost, replacement price Price effective from Koha item type
          IBB Library-Gidan Kwano IBB Library-Gidan Kwano 0000-00-00 Local purchase 0.00 B-33247 TK5105.59.S52 2342105087 2017-04-05 nc 1 0.00 0000-00-00 Books,Booklets,Workbooks