MARC details
000 -LEADER |
fixed length control field |
02755nam a2200445 a 4500 |
001 - CONTROL NUMBER |
control field |
698454 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230317144512.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr|||||||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
031022s2004 inu sb 001|0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781118075074 (ebook) |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(StDuBDS)AH26383501 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
StDuBDS |
Language of cataloging |
eng |
Transcribing agency |
StDuBDS |
Modifying agency |
StDuBDSZ |
-- |
UkPrAHLS |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
COM |
Source |
ukslc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
U |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
URD |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UT |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
U |
Source |
thema |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
URD |
Source |
thema |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UT |
Source |
thema |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Schneier, Bruce, |
Dates associated with a name |
1963- |
245 10 - TITLE STATEMENT |
Title |
Secrets and lies : |
Remainder of title |
digital security in a networked world / |
Statement of responsibility, etc. |
Bruce Schneier. |
250 ## - EDITION STATEMENT |
Edition statement |
[New ed.]. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Indianapolis, Ind. : |
Name of publisher, distributor, etc. |
Wiley, |
Date of publication, distribution, etc. |
c2004. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xiii, 414 p. |
366 ## - TRADE AVAILABILITY INFORMATION |
Detailed date of publication |
20040123 |
500 ## - GENERAL NOTE |
General note |
Previous ed.: 2000. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
520 8# - SUMMARY, ETC. |
Summary, etc. |
This work offers practical advice on achieving security throughout computer networks and explains why protecting information is harder in the digital world. |
Expansion of summary note |
"A primer in practical computer security aimed at those shopping, communicating, or doing business online almost everyone, in other words." The Economist Viruses. Identity theft. Corporate espionage. National secrets compromised. Can anyone promise security in our digital world? The man who introduced cryptography to the boardroom says no. But in this fascinating read, he shows us how to come closer by developing security measures in terms of context, tools, and strategy. Security is a process, not a product one that system administrators and corporate executives alike must understand to survive. "This book is of value to anyone whose business depends on safe use of e-mail, the Web, or other networked communications. If that's not yet everybody, it soon will be." Stephen H. Wildstrom, BusinessWeek "It's not often that a truly outstanding book is written for both technical users and management. Fortunately, Secrets and Lies pulls off this feat rather well." Dustin Puryear, Linux.com "Schneier ...peppers the book with lively anecdotes and aphorisms, making it unusually accessible." Los Angeles Times |
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE |
Additional physical form available note |
Also available in printed form ISBN 9780471453802 |
533 ## - REPRODUCTION NOTE |
Type of reproduction |
Electronic reproduction. |
Agency responsible for reproduction |
Askews and Holts. |
Note about reproduction |
Mode of access: World Wide Web. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computers and IT. |
Source of heading or term |
ukslc |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computing & information technology |
Source of heading or term |
thema |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Privacy & data protection |
Source of heading or term |
thema |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networking & communications |
Source of heading or term |
thema |
655 #7 - INDEX TERM--GENRE/FORM |
Source of term |
lcsh |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="http://www.vlebooks.com/vleweb/product/openreader?id=WestLondon&isbn=9781118075074">http://www.vlebooks.com/vleweb/product/openreader?id=WestLondon&isbn=9781118075074</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Suppress in OPAC |
Do not suppress from OPAC |
Source of classification or shelving scheme |
Dewey Decimal Classification |