Secrets and lies : (Record no. 18056)

MARC details
000 -LEADER
fixed length control field 01990cam a2200301Ia 4500
001 - CONTROL NUMBER
control field a4042
003 - CONTROL NUMBER IDENTIFIER
control field SIRSI
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 040304r20042000inu b 001 0 eng
019 ## -
-- 53393497
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0471453803
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780471453802
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) i9780471453802
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number S352 2000
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Schneier, Bruce,
Dates associated with a name 1963-
245 10 - TITLE STATEMENT
Title Secrets and lies :
Remainder of title digital security in a networked world /
Statement of responsibility, etc. Bruce Schneier.
246 30 - VARYING FORM OF TITLE
Title proper/short title Digital security in a networked world.
250 ## - EDITION STATEMENT
Edition statement Pbk. ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Indianapolis, Ind. :
Name of publisher, distributor, etc. Wiley,
Date of publication, distribution, etc. 2004.
300 ## - PHYSICAL DESCRIPTION
Extent xxii, 414 p. ;
Dimensions 23 cm.
500 ## - GENERAL NOTE
General note "With new information about post-9/11 security."--Cover.
500 ## - GENERAL NOTE
General note Originally published: 2000.
500 ## - GENERAL NOTE
General note Book copyrighted 2000, Chapters 1 and Introduction are copyrighted 2004.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc. An expert in cryptography and electronic security explores computer systems and threats, the hacker mindset, threat modeling, preventative technologies, and the implementation of security systems.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1.. Introduction -- Part 1. The Landscape -- 2.. Digital Threats -- 3.. Attacks -- 4.. Adversaries -- 5.. Security Needs -- Part 2. Technologies -- 6.. Cryptography -- 7.. Cryptography in Context -- 8.. Computer Security -- 9.. Identification and Authentication -- 10.. Networked-Computer Security -- 11.. Network Security -- 12.. Network Defenses -- 13.. Software Reliability -- 14.. Secure Hardware -- 15.. Certificates and Credentials -- 16.. Security Tricks -- 17.. The Human Factor -- Part 3. Strategies -- 18.. Vulnerabilities and the Vulnerability Landscape -- 19.. Threat Modeling and Risk Assessment -- 20.. Security Policies and Countermeasures -- 21.. Attack Trees -- 22.. Product Testing and Verification -- 23.. The Future of Products -- 24.. Security Processes -- 25.. Conclusion.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Shelving location Total checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Library of Congress Classification     AUE Library Collection MAIN MAIN General   QA76.9.A25 S352 2000 10023821 03/13/2021 1 11/19/2019 Books
    Library of Congress Classification     AUE Library Collection MAIN MAIN General   QA76.9.A25 S352 2000 10023841 03/13/2021 2 11/19/2019 Books