Security in computing (Record no. 208659)

MARC details
000 -LEADER
fixed length control field 02125nam a22003977a 4500
003 - CONTROL NUMBER IDENTIFIER
control field IIITD
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250723152354.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250709b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789367135587
040 ## - CATALOGING SOURCE
Original cataloging agency IIITD
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number PFL-S
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Pfleeger, Charles P.
245 ## - TITLE STATEMENT
Title Security in computing
Statement of responsibility, etc by Charles P. Pfleeger, Shari Lawrence Pfleeger and Lizzie Coles-Kemp
250 ## - EDITION STATEMENT
Edition statement 6th ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Noida :
Name of publisher, distributor, etc Pearson,
Date of publication, distribution, etc ©2025
300 ## - PHYSICAL DESCRIPTION
Extent xxxiii, 886 p. :
Other physical details ill. ;
Dimensions 22 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 ## - FORMATTED CONTENTS NOTE
Title 1. Introduction
505 ## - FORMATTED CONTENTS NOTE
Title 2. Toolbox : authentication, access control, and cryptography
505 ## - FORMATTED CONTENTS NOTE
Title 3. Programs and programming
505 ## - FORMATTED CONTENTS NOTE
Title 4. Operating systems
505 ## - FORMATTED CONTENTS NOTE
Title 5. Data and Databases
505 ## - FORMATTED CONTENTS NOTE
Title 6. Networks
505 ## - FORMATTED CONTENTS NOTE
Title 7. The Internet-user side
505 ## - FORMATTED CONTENTS NOTE
Title 8. Details of cryptography
505 ## - FORMATTED CONTENTS NOTE
Title 9. Privacy and Incidents
505 ## - FORMATTED CONTENTS NOTE
Title 10. Legal issues and ethics
520 ## - SUMMARY, ETC.
Summary, etc This book offers complete coverage of all aspects of computer security, including users, software, devices, operating systems, networks, law, and ethics. Reflecting rapidly evolving attacks, countermeasures, and computing environments, it introduces up-to-the-minute best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. Cryptography is critical to computer security; it is an essential tool that students and professionals must know, appreciate and understand. But as with most tools, the user does not need to be a maker: using a screwdriver successfully is entirely separate from knowing how to forge the metal from which it is made. This edition will separate the use of cryptography from its underlying mathematical principles.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks -- Security measures
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Security
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computers -- Access control
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Pfleeger, Shari Lawrence
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Coles-Kemp, Lizzie
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
Source of classification or shelving scheme Dewey Decimal Classification
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Bill No. Bill Date Cost, normal purchase price PO No. PO Date Total Checkouts Full call number Barcode Date last seen Cost, replacement price Price effective from Vendor/Supplier Koha item type
    Dewey Decimal Classification     Computer Science and Engineering IIITD IIITD General Stacks 09/07/2025 239/25-26 2025-06-30 865.15 IIITD/LIC/BS/2024/14/17 2025-06-10   005.8 PFL-S 013522 09/07/2025 1210 09/07/2025 Capital Books Pvt. Ltd. Books
© 2024 IIIT-Delhi, library@iiitd.ac.in