MARC details
000 -LEADER |
fixed length control field |
01468cam a22003375i 4500 |
001 - CONTROL NUMBER |
control field |
009052389 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
EG-ScBUE |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20200830160118.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
030630s2003 njua f 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0130914290 (pbk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780131115026 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Cancelled/invalid ISBN |
0131115022 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
StDuBDS |
Language of cataloging |
eng |
Description conventions |
rda |
Modifying agency |
Uk |
Transcribing agency |
EG-ScBUE |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
STA |
Edition number |
22 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Stallings, William, |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Cryptography and network security : |
Remainder of title |
principles and practice / |
Statement of responsibility, etc |
William Stallings. |
250 ## - EDITION STATEMENT |
Edition statement |
Third edition. |
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Upper Saddle River, NJ : |
Name of publisher, distributor, etc |
Prentice Hall Pearson Education International, |
Date of publication, distribution, etc |
2003. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xiv, 681 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Media type code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Carrier type code |
nc |
Source |
rdacarrier |
500 ## - GENERAL NOTE |
General note |
Previous ed.: 1999. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. |
Summary, etc |
Intended for one-semester, undergraduate and graduate level courses in Cryptography, Computer Security, and Network Security. This book provides a practical survey of both the principles and practice of cryptography and network security. It has been reorganized to provide the optimal sequence for classroom instruction and self-study. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data encryption (Computer science) |
Source of heading or term |
BUEsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures. |
Source of heading or term |
BUEsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
Source of heading or term |
BUEsh |
653 ## - INDEX TERM--UNCONTROLLED |
Resource For college |
Informatics and Computer Science |
Arrived date list |
August2020 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Book - Borrowing |