MARC details
000 -LEADER |
fixed length control field |
02379fam a22003374a 4500 |
001 - CONTROL NUMBER |
control field |
3016029 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240318183241.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
000519s2000 nyu 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
00042252 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0471253111 (alk. paper) |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)44167178 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)ocm44167178 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(NNC)3016029 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Transcribing agency |
DLC |
Modifying agency |
DLC |
-- |
NNC |
-- |
OrLoB-B |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
Item number |
S352 2000 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
21 |
Item number |
SCH |
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN) |
-- |
32525 |
-- |
32524 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Schneier, Bruce, |
Dates associated with a name |
1963- |
9 (RLIN) |
15323 |
245 10 - TITLE STATEMENT |
Title |
Secrets and lies : |
Remainder of title |
digital security in a networked world / |
Statement of responsibility, etc. |
Bruce Schneier. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
New York : |
Name of publisher, distributor, etc. |
John Wiley, |
Date of publication, distribution, etc. |
2000. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xv, 412 p. ; |
Dimensions |
24 cm. |
500 ## - GENERAL NOTE |
General note |
"Wiley Computer Publishing." |
505 00 - FORMATTED CONTENTS NOTE |
Miscellaneous information |
1. |
Title |
Introduction -- |
Miscellaneous information |
Pt. 1. |
Title |
The Landscape. |
Miscellaneous information |
2. |
Title |
Digital Threats. |
Miscellaneous information |
3. |
Title |
Attacks. |
Miscellaneous information |
4. |
Title |
Adversaries. |
Miscellaneous information |
5. |
Title |
Security Needs -- |
Miscellaneous information |
Pt. 2. |
Title |
Technologies. |
Miscellaneous information |
6. |
Title |
Cryptography. |
Miscellaneous information |
7. |
Title |
Cryptography in Context. |
Miscellaneous information |
8. |
Title |
Computer Security. |
Miscellaneous information |
9. |
Title |
Identification and Authentication. |
Miscellaneous information |
10. |
Title |
Networked-Computer Security. |
Miscellaneous information |
11. |
Title |
Network Security. |
Miscellaneous information |
12. |
Title |
Network Defenses. |
Miscellaneous information |
13. |
Title |
Software Reliability. |
Miscellaneous information |
14. |
Title |
Secure Hardware. |
Miscellaneous information |
15. |
Title |
Certificates and Credentials. |
Miscellaneous information |
16. |
Title |
Security Tricks. |
Miscellaneous information |
17. |
Title |
The Human Factor -- |
Miscellaneous information |
Pt. 3. |
Title |
Strategies. |
Miscellaneous information |
18. |
Title |
Vulnerabilities and the Vulnerability Landscape. |
Miscellaneous information |
19. |
Title |
Threat Modeling and Risk Assessment. |
Miscellaneous information |
20. |
Title |
Security Policies and Countermeasures. |
Miscellaneous information |
21. |
Title |
Attack Trees. |
Miscellaneous information |
22. |
Title |
Product Testing and Verification. |
Miscellaneous information |
23. |
Title |
The Future of Products. |
Miscellaneous information |
24. |
Title |
Security Processes. |
Miscellaneous information |
25. |
Title |
Conclusion. |
520 1# - SUMMARY, ETC. |
Summary, etc. |
"Information security expert Bruce Schneier explains what everyone in business needs to know about security in order to survive and be competitive. Pragmatic, interesting, and humorous, Schneier exposes the digital world and the realities of our networked society. He examines the entire system, from the reasons for technical insecurities to the minds behind malicious attacks. |
520 8# - SUMMARY, ETC. |
Summary, etc. |
You'll be guided through the security war zone, and learn how to understand and arm yourself against the threats of our connected world." "Secrets and Lies offers the expert guidance you'll need to make the right choices about securing your digital self."--BOOK JACKET. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
9 (RLIN) |
1751 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures. |
9 (RLIN) |
970 |
900 ## - EQUIVALENCE OR CROSS-REFERENCE-PERSONAL NAME [LOCAL, CANADA] |
Numeration |
TOC |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Book |
Koha issues (borrowed), all copies |
2 |