| 000 | 05089cam a22008654a 4500 | ||
|---|---|---|---|
| 005 | 20250919212023.0 | ||
| 006 | m o d | ||
| 007 | cr cnu---unuuu | ||
| 008 | 171208s2006 njua ob 001 0 eng d | ||
| 020 |
_a0471744182 _q(electronic bk.) |
||
| 020 |
_a9780471744184 _q(electronic bk.) |
||
| 020 |
_a9780471738480 _q(cloth) |
||
| 020 |
_a0471738484 _q(cloth) |
||
| 020 |
_a0471744190 _q(electronic bk.) |
||
| 020 |
_a9780471744191 _q(electronic bk.) |
||
| 020 | _a1280241446 | ||
| 020 | _a9781280241444 | ||
| 024 | 7 |
_a10.1002/0471744190 _2doi |
|
| 029 | 1 |
_aAU@ _b000042132971 |
|
| 029 | 1 |
_aAU@ _b000048781669 |
|
| 029 | 1 |
_aDEBSZ _b396074359 |
|
| 029 | 1 |
_aDEBSZ _b430311435 |
|
| 029 | 1 |
_aDEBSZ _b449073270 |
|
| 029 | 1 |
_aNZ1 _b11776724 |
|
| 029 | 1 |
_aNZ1 _b12277300 |
|
| 035 |
_a(OCoLC)62303924 _z(OCoLC)63651389 _z(OCoLC)85820655 _z(OCoLC)181839246 _z(OCoLC)489557665 _z(OCoLC)606165720 _z(OCoLC)607681727 _z(OCoLC)806202327 _z(OCoLC)814294262 |
||
| 035 | _a(OCoLC)ocm62303924 | ||
| 037 |
_bOverDrive, Inc. _nhttp://www.overdrive.com |
||
| 037 |
_a310C0D18-7395-435E-BA71-41A0448F3D13 _bOverDrive, Inc. _nhttp://www.overdrive.com |
||
| 039 | 9 |
_a201902141034 _bmurni _y12-08-2017 _zhafiz _wMYUKM (1).mrc _x54 |
|
| 040 |
_aNST _beng _epn _cNST _dOCLCQ _dYDXCP _dORE _dOCLCQ _dORE _dOCLCQ _dTEFOD _dIDEBK _dVT2 _dOCLCE _dE7B _dOCLCQ _dREDDC _dOCLCQ _dOCLCF _dDG1 _dWOS _dOKU _dDEBSZ _dOCLCQ _dMUX _dNRU _dUKDOC _dTEFOD _dEBLCP _dCOO _dOCLCQ _dDG1 |
||
| 042 | _adlr | ||
| 049 | _aMAIN | ||
| 050 | 4 |
_aQA76.9.A25 _bS69 2006eb |
|
| 072 | 7 |
_aCOM _x060040 _2bisacsh |
|
| 072 | 7 |
_aCOM _x043050 _2bisacsh |
|
| 072 | 7 |
_aCOM _x053000 _2bisacsh |
|
| 072 | 7 |
_aUT _2bicssc |
|
| 082 | 0 | 4 |
_a005.8 _222 |
| 100 | 1 | _aStamp, Mark. | |
| 245 | 1 | 0 |
_aInformation security : _bprinciples and practice / _cMark Stamp. |
| 260 |
_aHoboken, N.J. : _bWiley-Interscience, _c©2006. |
||
| 300 |
_a1 online resource (xxi, 390 pages) : _billustrations |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 504 | _aIncludes bibliographical references (pages 359-379) and index. | ||
| 505 | 0 | _aCrypto basics -- Symmetric key crypto -- Public key crypto -- Hash functions and other topics -- Advanced cryptanalysis -- Authentication -- Authorization -- Simple authentication protocols -- Real-world security protocols -- Software flaws and malware -- Insecurity in software -- Operating systems and security. | |
| 506 |
_3Use copy _fRestrictions unspecified _2star _5MiAaHDL |
||
| 520 | 1 | _a'As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges.''Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems - ranging from basic to challenging - to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues.'--Jacket. | |
| 533 |
_aElectronic reproduction. _b[S.l.] : _cHathiTrust Digital Library, _d2010. _5MiAaHDL |
||
| 538 |
_aMaster and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. _uhttp://purl.oclc.org/DLF/benchrepro0212 _5MiAaHDL |
||
| 583 | 1 |
_adigitized _c2010 _hHathiTrust Digital Library _lcommitted to preserve _2pda _5MiAaHDL |
|
| 588 | 0 | _aPrint version record. | |
| 650 | 0 | _aComputer security. | |
| 650 | 6 | _aSécurité informatique. | |
| 650 | 6 |
_aOrdinateurs _xAccès _xContrôle. |
|
| 650 | 6 |
_aLogiciels _xProtection. |
|
| 650 | 6 |
_aProtocoles de réseaux d'ordinateurs _xSécurité _xMesures. |
|
| 650 | 6 | _aCryptographie. | |
| 650 | 7 |
_aCOMPUTERS _xInternet _xSecurity. _2bisacsh |
|
| 650 | 7 |
_aCOMPUTERS _xNetworking _xSecurity. _2bisacsh |
|
| 650 | 7 |
_aCOMPUTERS _xSecurity _xGeneral. _2bisacsh |
|
| 650 | 7 |
_aComputer security. _2fast _0(OCoLC)fst00872484 |
|
| 655 | 4 | _aElectronic books. | |
| 773 | 0 | _tWiley e-books | |
| 776 | 0 | 8 |
_iPrint version: _aStamp, Mark. _tInformation security. _dHoboken, N.J. : Wiley-Interscience, ©2006 _z0471738484 _w(DLC) 2005005152 _w(OCoLC)57754240 |
| 856 | 4 | 0 |
_uhttp://www.ezplib.ukm.edu.my/login?url=http://onlinelibrary.wiley.com/book/10.1002/0471744190 _zWiley Online Library |
| 907 |
_a.b1653671x _b2021-06-25 _c2019-11-12 |
||
| 942 | _n0 | ||
| 914 | _avtls003628593 | ||
| 998 |
_ae _b2017-08-12 _cm _dz _feng _gnju _y0 _z.b1653671x |
||
| 999 |
_c690138 _d690138 |
||