Information security : (Record no. 11204)

000 -LEADER
fixed length control field 02615nam a22003017a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230210182820.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230110b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119505907 [hardbound]
040 ## - CATALOGING SOURCE
Original cataloging agency University of Cebu-Banilad Campus
Transcribing agency University of Cebu-Banilad Campus
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8 St23 2022
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Stamp, Mark.
Relator term author.
245 ## - TITLE STATEMENT
Title Information security :
Remainder of title principles and practice /
Statement of responsibility, etc Mark Stamp, San Jose State University, San Jose, California.
250 ## - EDITION STATEMENT
Edition statement Third edition.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Hoboken, NJ :
Name of publisher, distributor, etc John Wiley & Sons, Inc.,
Date of publication, distribution, etc c2022.
300 ## - PHYSICAL DESCRIPTION
Extent xvi, 430 pages :
Other physical details illustrations ;
336 ## -
-- rdacontent
-- text
337 ## -
-- rdamedia
-- unmediated
338 ## -
-- rdacarrier
-- volume
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Contents: I Crypto -- 1 Introductions -- 2 Classic crypto -- 3 Symmetric ciphers -- 4 Public key crypto -- 5 Crypto has functions++ -- II Access control -- 6 Authentication -- 7 Authorization -- III Topics in network security -- 8 Network security basics -- 9 Simple authentication protocols -- 10 Real-world security protocols -- IV Software -- 11 Software flaws and malware -- 12 Insecurity in software.
520 ## - SUMMARY, ETC.
Summary, etc Summary: "Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Working knowledge is required of aspects of cryptography such as classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis. Experts must also use access control techniques like authentication and authorization, password-based security, ACLs and capabilities, multilevel security and compartments, covert channels and inference control. Among the various protocols used in information security are simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, and GSM. Software can create problems including flaws and malware, buffer overflows, viruses and worms, and also solve them using tools such as malware detection, digital rights management, secure software development, and operating systems security"--
541 ## - IMMEDIATE SOURCE OF ACQUISITION NOTE
-- Moma Ortega
-- Computer Studies, Information Technology, Information Systems and Animation
-- Computer Studies : Information Technology
546 ## - LANGUAGE NOTE
Language note English
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Book
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Cataloger's initials, CIN (RLIN) Aillen [new]
First Date, FD (RLIN) 01/10/2023
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
          College Library College Library   24/11/2022 CD Books 9716.25   005.8 St23 2022 3UCBL000026514 10/01/2023 10/01/2023 Book

University of Cebu - Banilad | 6000, Gov. M. Cuenco Ave, Cebu City, 6000 Cebu, Philippines
Tel. 410 8822 local 7123| e-mail ucbaniladcampus.library@gmail.com

Powered by Koha