MARC details
| 000 -LEADER |
| fixed length control field |
01465cam a2200253 i 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20160322165210.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
130705t20142014flua b 001 0 eng |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781439860717 (hardback) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
1439860718 (hardback) |
| 041 ## - LANGUAGE CODE |
| Language code of text/sound track or separate title |
eng |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
004.056 |
| Item number |
BRO |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Brooks, R. R. |
| 9 (RLIN) |
2404 |
| 245 10 - TITLE STATEMENT |
| Title |
Introduction to computer and network security : |
| Remainder of title |
navigating shades of gray / |
| Statement of responsibility, etc. |
Richard R. Brooks, Clemson University, South Carolina, USA. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc. |
Boca Raton ; |
| -- |
London : |
| Name of publisher, distributor, etc. |
CRC Press, Taylor & Francis Group, |
| Date of publication, distribution, etc. |
2014. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xxiv, 295 pages : |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
"This text provides a classroom-tested, practical introduction to software design and implementation, cryptographic tools, and networking issues while addressing social, economic, and political implications. It covers cutting-edge topics, such as wireless security and attacks on websites, privacy and digital rights management, and recent work on security and economics. The text includes hands-on projects to help students better understand how computers and networks function. It also contains a number of case studies and discussion points"-- |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security. |
| 9 (RLIN) |
348 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer networks |
| General subdivision |
Security measures. |
| 9 (RLIN) |
482 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Data protection. |
| 9 (RLIN) |
1140 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Data encryption (Computer science) |
| 9 (RLIN) |
107 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
COMPUTERS / Security / General. |
| 9 (RLIN) |
2254 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
COMPUTERS / Security / Cryptography. |
| 9 (RLIN) |
2405 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Koha item type |
Books |