Engineering information security : (Record no. 40464)

MARC details
000 -LEADER
fixed length control field 04929nam a2201201 i 4500
001 - CONTROL NUMBER
control field 6047604
003 - CONTROL NUMBER IDENTIFIER
control field IEEE
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230927112353.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |n|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 151221s2011 njua ob 001 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780470947913
Qualifying information ebook
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780470565124
Qualifying information print
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 0470947918
Qualifying information electronic
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 0470947837
Qualifying information electronic
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780470947838
Qualifying information electronic
024 8# - OTHER STANDARD IDENTIFIER
Standard number or code 9786613138781
035 ## - SYSTEM CONTROL NUMBER
System control number (CaBNVSL)mat06047604
035 ## - SYSTEM CONTROL NUMBER
System control number (IDAMS)0b00006481692aa6
040 ## - CATALOGING SOURCE
Original cataloging agency CaBNVSL
Language of cataloging eng
Description conventions rda
Transcribing agency CaBNVSL
Modifying agency CaBNVSL
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Jacobs, Stuart,
Relator term author.
245 10 - TITLE STATEMENT
Title Engineering information security :
Remainder of title the application of systems engineering concepts to achieve information assurance /
Statement of responsibility, etc. Stuart Jacobs.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Hoboken, New Jersey :
Name of producer, publisher, distributor, manufacturer Wiley,
Date of production, publication, distribution, manufacture, or copyright notice c2011.
264 #2 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture [Piscataqay, New Jersey] :
Name of producer, publisher, distributor, manufacturer IEEE Xplore,
Date of production, publication, distribution, manufacture, or copyright notice [2011]
300 ## - PHYSICAL DESCRIPTION
Extent 1 PDF (xxv, 700 pages) :
Other physical details illustrations.
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term electronic
Source isbdmedia
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement IEEE press series on information and communication networks security ;
Volume/sequential designation 13
500 ## - GENERAL NOTE
General note Some online versions lack accompanying media packaged with the printed version.
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note What is Security? -- Systems Engineering -- Foundation Concepts -- Authentication of Subjects -- Security Systems Engineering -- Traditional Network Concepts -- Next-Generation Networks -- General Computer Security Architecture -- Computer Software Security -- Security Systems Design-Designing Network Security -- Transport and Application Security Design and Use -- Securing Management and Managing Security.
506 1# - RESTRICTIONS ON ACCESS NOTE
Terms governing access Restricted to subscribers or individual electronic text purchasers.
520 ## - SUMMARY, ETC.
Summary, etc. "Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society."--Provided by publisher.
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Also available in print.
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: World Wide Web
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on PDF viewed 12/21/2015.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information technology
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
695 ## -
-- Access control
695 ## -
-- Artificial neural networks
695 ## -
-- Atomic measurements
695 ## -
-- Authentication
695 ## -
-- Availability
695 ## -
-- Biographies
695 ## -
-- Buildings
695 ## -
-- Business
695 ## -
-- Central Processing Unit
695 ## -
-- Complexity theory
695 ## -
-- Computational modeling
695 ## -
-- Computer architecture
695 ## -
-- Computer security
695 ## -
-- Computers
695 ## -
-- Context
695 ## -
-- Cryptography
695 ## -
-- Data models
695 ## -
-- Encryption
695 ## -
-- Hardware
695 ## -
-- Humans
695 ## -
-- IEC standards
695 ## -
-- IP networks
695 ## -
-- ISO standards
695 ## -
-- Indexes
695 ## -
-- Information security
695 ## -
-- Internet
695 ## -
-- Iron
695 ## -
-- Linux
695 ## -
-- Media
695 ## -
-- Monitoring
695 ## -
-- Network topology
695 ## -
-- Next generation networking
695 ## -
-- Open systems
695 ## -
-- Operating systems
695 ## -
-- Organizations
695 ## -
-- Permission
695 ## -
-- Personnel
695 ## -
-- Physical layer
695 ## -
-- Process control
695 ## -
-- Protocols
695 ## -
-- Registers
695 ## -
-- Schedules
695 ## -
-- Security
695 ## -
-- Servers
695 ## -
-- Sockets
695 ## -
-- Software
695 ## -
-- Standards organizations
695 ## -
-- Telecommunications
695 ## -
-- Topology
695 ## -
-- Vectors
695 ## -
-- Virtual private networks
695 ## -
-- Workstations
695 ## -
-- XML
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element IEEE Xplore (Online Service),
Relator term distributor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element Wiley InterScience (Online service),
Relator term publisher.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
International Standard Book Number 9780470565124
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title IEEE press series on information and communication networks security ;
Volume/sequential designation 13
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract with links to resource
Uniform Resource Identifier <a href="https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a>

No items available.

© 2023 IMPA Library | Customized & Maintained by Sérgio Pilotto


Powered by Koha