MARC details
| 000 -LEADER |
| fixed length control field |
02125nam a22003977a 4500 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
IIITD |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20250723152354.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
250709b |||||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9789367135587 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
IIITD |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Item number |
PFL-S |
| 100 ## - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Pfleeger, Charles P. |
| 245 ## - TITLE STATEMENT |
| Title |
Security in computing |
| Statement of responsibility, etc |
by Charles P. Pfleeger, Shari Lawrence Pfleeger and Lizzie Coles-Kemp |
| 250 ## - EDITION STATEMENT |
| Edition statement |
6th ed. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc |
Noida : |
| Name of publisher, distributor, etc |
Pearson, |
| Date of publication, distribution, etc |
©2025 |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xxxiii, 886 p. : |
| Other physical details |
ill. ; |
| Dimensions |
22 cm. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc |
Includes bibliographical references and index. |
| 505 ## - FORMATTED CONTENTS NOTE |
| Title |
1. Introduction |
| 505 ## - FORMATTED CONTENTS NOTE |
| Title |
2. Toolbox : authentication, access control, and cryptography |
| 505 ## - FORMATTED CONTENTS NOTE |
| Title |
3. Programs and programming |
| 505 ## - FORMATTED CONTENTS NOTE |
| Title |
4. Operating systems |
| 505 ## - FORMATTED CONTENTS NOTE |
| Title |
5. Data and Databases |
| 505 ## - FORMATTED CONTENTS NOTE |
| Title |
6. Networks |
| 505 ## - FORMATTED CONTENTS NOTE |
| Title |
7. The Internet-user side |
| 505 ## - FORMATTED CONTENTS NOTE |
| Title |
8. Details of cryptography |
| 505 ## - FORMATTED CONTENTS NOTE |
| Title |
9. Privacy and Incidents |
| 505 ## - FORMATTED CONTENTS NOTE |
| Title |
10. Legal issues and ethics |
| 520 ## - SUMMARY, ETC. |
| Summary, etc |
This book offers complete coverage of all aspects of computer security, including users, software, devices, operating systems, networks, law, and ethics. Reflecting rapidly evolving attacks, countermeasures, and computing environments, it introduces up-to-the-minute best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. Cryptography is critical to computer security; it is an essential tool that students and professionals must know, appreciate and understand. But as with most tools, the user does not need to be a maker: using a screwdriver successfully is entirely separate from knowing how to forge the metal from which it is made. This edition will separate the use of cryptography from its underlying mathematical principles. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer networks -- Security measures |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Data protection |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer Security |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computers -- Access control |
| 700 ## - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Pfleeger, Shari Lawrence |
| 700 ## - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Coles-Kemp, Lizzie |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Koha item type |
Books |
| Source of classification or shelving scheme |
Dewey Decimal Classification |