Library Catalogue

Secrets and lies : (Record no. 32525)

MARC details
000 -LEADER
fixed length control field 02379fam a22003374a 4500
001 - CONTROL NUMBER
control field 3016029
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240318183241.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 000519s2000 nyu 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 00042252
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0471253111 (alk. paper)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)44167178
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocm44167178
035 ## - SYSTEM CONTROL NUMBER
System control number (NNC)3016029
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency DLC
-- NNC
-- OrLoB-B
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number S352 2000
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 21
Item number SCH
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN)
-- 32525
-- 32524
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Schneier, Bruce,
Dates associated with a name 1963-
9 (RLIN) 15323
245 10 - TITLE STATEMENT
Title Secrets and lies :
Remainder of title digital security in a networked world /
Statement of responsibility, etc. Bruce Schneier.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New York :
Name of publisher, distributor, etc. John Wiley,
Date of publication, distribution, etc. 2000.
300 ## - PHYSICAL DESCRIPTION
Extent xv, 412 p. ;
Dimensions 24 cm.
500 ## - GENERAL NOTE
General note "Wiley Computer Publishing."
505 00 - FORMATTED CONTENTS NOTE
Miscellaneous information 1.
Title Introduction --
Miscellaneous information Pt. 1.
Title The Landscape.
Miscellaneous information 2.
Title Digital Threats.
Miscellaneous information 3.
Title Attacks.
Miscellaneous information 4.
Title Adversaries.
Miscellaneous information 5.
Title Security Needs --
Miscellaneous information Pt. 2.
Title Technologies.
Miscellaneous information 6.
Title Cryptography.
Miscellaneous information 7.
Title Cryptography in Context.
Miscellaneous information 8.
Title Computer Security.
Miscellaneous information 9.
Title Identification and Authentication.
Miscellaneous information 10.
Title Networked-Computer Security.
Miscellaneous information 11.
Title Network Security.
Miscellaneous information 12.
Title Network Defenses.
Miscellaneous information 13.
Title Software Reliability.
Miscellaneous information 14.
Title Secure Hardware.
Miscellaneous information 15.
Title Certificates and Credentials.
Miscellaneous information 16.
Title Security Tricks.
Miscellaneous information 17.
Title The Human Factor --
Miscellaneous information Pt. 3.
Title Strategies.
Miscellaneous information 18.
Title Vulnerabilities and the Vulnerability Landscape.
Miscellaneous information 19.
Title Threat Modeling and Risk Assessment.
Miscellaneous information 20.
Title Security Policies and Countermeasures.
Miscellaneous information 21.
Title Attack Trees.
Miscellaneous information 22.
Title Product Testing and Verification.
Miscellaneous information 23.
Title The Future of Products.
Miscellaneous information 24.
Title Security Processes.
Miscellaneous information 25.
Title Conclusion.
520 1# - SUMMARY, ETC.
Summary, etc. "Information security expert Bruce Schneier explains what everyone in business needs to know about security in order to survive and be competitive. Pragmatic, interesting, and humorous, Schneier exposes the digital world and the realities of our networked society. He examines the entire system, from the reasons for technical insecurities to the minds behind malicious attacks.
520 8# - SUMMARY, ETC.
Summary, etc. You'll be guided through the security war zone, and learn how to understand and arm yourself against the threats of our connected world." "Secrets and Lies offers the expert guidance you'll need to make the right choices about securing your digital self."--BOOK JACKET.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
9 (RLIN) 1751
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
9 (RLIN) 970
900 ## - EQUIVALENCE OR CROSS-REFERENCE-PERSONAL NAME [LOCAL, CANADA]
Numeration TOC
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book
Koha issues (borrowed), all copies 2
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Total Checkouts Total Renewals Full call number Barcode Date last seen Date last checked out Price effective from Koha item type
    Dewey Decimal Classification     Archbishop Kiwanuka Memorial Library Archbishop Kiwanuka Memorial Library 13/02/2012 2 1 005.8 SCH 5202 30/08/2023 24/08/2023 13/02/2012 Book
    Dewey Decimal Classification     Archbishop Kiwanuka Memorial Library Archbishop Kiwanuka Memorial Library 13/02/2012 1   005.8 SCH 3189 16/10/2023 10/10/2023 13/02/2012 Book

Archbishop Kiwanuka Memorial Library | Uganda Martyrs University P.O. Box : 5498 Kampala, Uganda
Tel : +256-(0) 382-277-901 or +256-(0) 382-410-611 / E-mail : library@umu.ac.ug