FEEDBACK Smiley face

A multidisciplinary introduction to information security (Record no. 7439)

000 -LEADER
fixed length control field 03065cam a22003614a 4500
001 - CONTROL NUMBER
control field 17021712
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140924165541.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 111026s2011 flua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2011039831
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781420085907
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number M845 2012
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
Item number MJO-M
084 ## - OTHER CLASSIFICATION NUMBER
Classification number COM059000
-- COM043000
-- TEC007000
Source of number bisacsh
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Mjolsnes, Stig F.
245 02 - TITLE STATEMENT
Title A multidisciplinary introduction to information security
Statement of responsibility, etc [edited by] Stig F. Mjolsnes.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Boca Raton :
Name of publisher, distributor, etc CRC Press,
Date of publication, distribution, etc c2012.
300 ## - PHYSICAL DESCRIPTION
Extent xxv, 322 p. :
Other physical details ill. ;
Dimensions 25 cm.
490 0# - SERIES STATEMENT
Series statement Discrete mathematics and its applications
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc "Preface The problems of information security is a truly multidisciplinary field of study, ranging from the methods of pure mathematics through computer and telecommunication sciences to social sciences. The intention of this multiauthored book is to o er an introduction to a wide set of topics in ICT information security, privacy and safety. Certainly, the aim has not been to present a complete treatment of this vast and expanding area of practical and theoretical knowledge. Rather, the hope is that the selected range of topics presented here may attract a wider audience of students and professionals than would each specialized topic by itself. Some of the information security topics contained in this book may be familiar turf for the reader already. However, the reader will likely also nd some new interesting topics presented here that are relevant to his or her professional needs, or for enhancement of knowledge and competence, or as an attractive starting point for further reading and in-depth studies. For instance, the book may provide an entrance and a guide to seek out more specialized courses available at universities and elsewhere, or as an inspiration for further work in projects and assignments. The start of this collection of information security topics goes back to a master level continuing education course that I organized in 2005, where more than 10 professors and researchers contributed from 6 di erent departments at the Norwegian University of Science and Technology. The topics included cryptography, hardware security, software security, communication and network security, intrusion detection systems, access policy and control, risk and vulnerability analysis, and security technology management"--
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computers
General subdivision Access control.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Multidisciplinary design optimization.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS / Computer Engineering.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS / Networking / General.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element TECHNOLOGY & ENGINEERING / Electrical.
Source of heading or term bisacsh
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Permanent location Current location Shelving location Date acquired Cost, normal purchase price Total Checkouts Total Renewals Full call number Barcode Date last seen Date last borrowed Cost, replacement price Price effective from Koha item type Bill No. Bill Date PO No. PO Date Vendor/Supplier
          Computer Science and Engineering IIITD IIITD Reference 2013-03-20 3597.26 2 1 REF 005.8 MJO-M 001431 2014-06-27 2014-05-26 £57.99 2013-03-20 Books IN4607/12-13 2013-03-19 IIITD/LIC/BS/2012/02/12 2013-02-21 Shankar's Book Agency Pvt. Ltd.

© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in