Crimeware : (Record no. 6755)

MARC details
000 -LEADER
fixed length control field 01717cam a2200349 a 4500
001 - CONTROL NUMBER
control field 15110270
003 - CONTROL NUMBER IDENTIFIER
control field IIITD
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140924153633.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 071212s2008 njua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2007050736
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780321501950
022 ## - INTERNATIONAL STANDARD SERIAL NUMBER
Source 9780321501950
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn183926572
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)183926572
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency BAKER
-- YDXCP
-- C#P
-- DLC
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number C75 2008
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
Item number JAK-C
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Jakobsson, Markus.
245 00 - TITLE STATEMENT
Title Crimeware :
Remainder of title understanding new attacks and defenses
Statement of responsibility, etc Markus Jakobsson, Zulfikar Ramzan.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Upper Saddle River, NJ :
Name of publisher, distributor, etc Addison-Wesley,
Date of publication, distribution, etc c2008.
300 ## - PHYSICAL DESCRIPTION
Extent xxi, 582 p. :
Other physical details ill. ;
Dimensions 24 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references (p. 525-556) and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Overview of crimeware -- A taxonomy of coding errors -- Crimeware and peer-to-peer networks -- Crimeware in small devices -- Crimeware in firmware -- Crimeware in the browser -- Bot networks -- Rootkits -- Virtual worlds and fraud -- Cybercrime and politics -- Online advertising fraud -- Crimeware business models -- The educational aspect of security -- Surreptitious code and the law -- Crimeware and trusted computing -- Technical defense techniques -- The future of crimeware.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Internet
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Ramzan, Zulfikar.
856 41 - ELECTRONIC LOCATION AND ACCESS
Materials specified Table of contents only
Uniform Resource Identifier <a href="http://www.loc.gov/catdir/toc/ecip086/2007050736.html">http://www.loc.gov/catdir/toc/ecip086/2007050736.html</a>
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Bill No. Bill Date Cost, normal purchase price Total Checkouts Total Renewals Full call number Barcode Date last seen Date checked out Cost, replacement price Price effective from Vendor/Supplier Koha item type
    Dewey Decimal Classification     Computer Science and Engineering IIITD IIITD Reference 07/01/2013 28171 2009-08-17 2336.25 1 2 REF 005.8 JAK-C 000240 30/03/2015 16/02/2015 $59.99 07/01/2013 Segment Book Dist. Books
© 2024 IIIT-Delhi, library@iiitd.ac.in