000 -LEADER |
fixed length control field |
02615nam a22003017a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230210182820.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
230110b xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781119505907 [hardbound] |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
University of Cebu-Banilad Campus |
Transcribing agency |
University of Cebu-Banilad Campus |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 St23 2022 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Stamp, Mark. |
Relator term |
author. |
245 ## - TITLE STATEMENT |
Title |
Information security : |
Remainder of title |
principles and practice / |
Statement of responsibility, etc |
Mark Stamp, San Jose State University, San Jose, California. |
250 ## - EDITION STATEMENT |
Edition statement |
Third edition. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Hoboken, NJ : |
Name of publisher, distributor, etc |
John Wiley & Sons, Inc., |
Date of publication, distribution, etc |
c2022. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xvi, 430 pages : |
Other physical details |
illustrations ; |
336 ## - |
-- |
rdacontent |
-- |
text |
337 ## - |
-- |
rdamedia |
-- |
unmediated |
338 ## - |
-- |
rdacarrier |
-- |
volume |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Contents: I Crypto -- 1 Introductions -- 2 Classic crypto -- 3 Symmetric ciphers -- 4 Public key crypto -- 5 Crypto has functions++ -- II Access control -- 6 Authentication -- 7 Authorization -- III Topics in network security -- 8 Network security basics -- 9 Simple authentication protocols -- 10 Real-world security protocols -- IV Software -- 11 Software flaws and malware -- 12 Insecurity in software. |
520 ## - SUMMARY, ETC. |
Summary, etc |
Summary: "Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Working knowledge is required of aspects of cryptography such as classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis. Experts must also use access control techniques like authentication and authorization, password-based security, ACLs and capabilities, multilevel security and compartments, covert channels and inference control. Among the various protocols used in information security are simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, and GSM. Software can create problems including flaws and malware, buffer overflows, viruses and worms, and also solve them using tools such as malware detection, digital rights management, secure software development, and operating systems security"-- |
541 ## - IMMEDIATE SOURCE OF ACQUISITION NOTE |
-- |
Moma Ortega |
-- |
Computer Studies, Information Technology, Information Systems and Animation |
-- |
Computer Studies : Information Technology |
546 ## - LANGUAGE NOTE |
Language note |
English |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
Book |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Cataloger's initials, CIN (RLIN) |
Aillen [new] |
First Date, FD (RLIN) |
01/10/2023 |