| 000 | 03390cam a2200673Ka 4500 | ||
|---|---|---|---|
| 005 | 20250919211737.0 | ||
| 006 | m o d | ||
| 007 | cr bn||||||abp | ||
| 007 | cr bn||||||ada | ||
| 008 | 171212s2000 nyu ob 001 0 eng d | ||
| 020 |
_a9781119183631 _q(electronic bk.) |
||
| 020 |
_a1119183634 _q(electronic bk.) |
||
| 020 |
_z0471253111 _q(alk. paper) |
||
| 020 |
_z9780471253112 _q(alk. paper) |
||
| 029 | 1 |
_aGBVCP _b856568880 |
|
| 029 | 1 |
_aDEBBG _bBV043391033 |
|
| 035 |
_a(OCoLC)606404498 _z(OCoLC)608753581 |
||
| 035 | _a(OCoLC)ocn606404498 | ||
| 039 | 9 |
_a201902121523 _bros _y12-12-2017 _zhafiz _wMYUKM (1).mrc _x234 |
|
| 040 |
_aOCLCE _beng _epn _cOCLCE _dOCLCQ _dOCLCO _dOCLCQ _dOCLCF _dCCO _dYDXCP _dDG1 _dOCLCQ _dDEBBG |
||
| 042 | _adlr | ||
| 049 | _aMAIN | ||
| 050 | 4 |
_aQA76.9.A25 _bS352 2000 |
|
| 082 | 0 | 4 |
_a005.8 _221 |
| 100 | 1 |
_aSchneier, Bruce, _d1963- |
|
| 245 | 1 | 0 |
_aSecrets and lies : _bdigital security in a networked world / _cBruce Schneier. |
| 260 |
_aNew York : _bJohn Wiley, _c2000. |
||
| 300 | _a1 online resource (xv, 412 pages) | ||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 504 | _aIncludes bibliographical references (pages 399-400) and index. | ||
| 505 | 0 | 0 |
_g1. _tIntroduction -- _gpt. 1. _tThe landscape -- _g2. _tDigital threats -- _g3. _tAttacks -- _g4. _tAdversaries -- _g5. _tSecurity needs -- _gpt. 2. _tTechnologies -- _g6. _tCryptography -- _g7. _tCryptography in context -- _g8. _tComputer security -- _g9. _tIdentification and authentication -- _g10. _tNetworked-computer security -- _g11. _tNetwork security -- _g12. _tNetwork defenses -- _g13. _tSoftware reliability -- _g14. _tSecure hardware -- _g15. _tCertificates and credentials -- _g16. _tSecurity tricks -- _g17. _tThe human factor -- _gpt. 3. _tStrategies -- _g18. _tVulnerabilities and the vulnerability landscape -- _g19. _tT. |
| 506 |
_3Use copy _fRestrictions unspecified _2star _5MiAaHDL |
||
| 533 |
_aElectronic reproduction. _b[S.l.] : _cHathiTrust Digital Library, _d2010. _5MiAaHDL |
||
| 538 |
_aMaster and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. _uhttp://purl.oclc.org/DLF/benchrepro0212 _5MiAaHDL |
||
| 583 | 1 |
_adigitized _c2010 _hHathiTrust Digital Library _lcommitted to preserve _2pda _5MiAaHDL |
|
| 588 | 0 | _aPrint version record. | |
| 650 | 0 | _aComputer security. | |
| 650 | 0 |
_aComputer networks _xSecurity measures. |
|
| 650 | 4 | _asécurité information. | |
| 650 | 4 | _afiabilité logiciel. | |
| 650 | 4 | _aauthentification. | |
| 650 | 4 | _aidentification. | |
| 650 | 4 | _acryptographie. | |
| 650 | 4 | _asécurité ordinateur. | |
| 650 | 4 | _asécurité réseau. | |
| 650 | 6 | _aSécurité informatique. | |
| 650 | 6 |
_aRéseaux d'ordinateurs _xSécurité _xMesures. |
|
| 773 | 0 | _tWiley e-books | |
| 776 | 0 | 8 |
_iPrint version: _aSchneier, Bruce, 1963- _tSecrets and lies. _dNew York : John Wiley, 2000 _w(DLC) 00042252 _w(OCoLC)44167178 |
| 856 | 4 | 0 |
_uhttps://eresourcesptsl.ukm.remotexs.co/user/login?url=http://onlinelibrary.wiley.com/book/10.1002/9781119183631 _zWiley Online Library |
| 907 |
_a.b16539801 _b2022-10-25 _c2019-11-12 |
||
| 942 | _n0 | ||
| 914 | _avtls003628906 | ||
| 998 |
_ae _b2017-12-12 _cm _dz _feng _gnyu _y0 _z.b16539801 |
||
| 999 |
_c688923 _d688923 |
||