รายละเอียดในรูปแบบ MARC
| 000 -LEADER |
| fixed length control field |
01778nam a22002657a#4500 |
| 001 - CONTROL NUMBER |
| control field |
824560 |
| 007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
| fixed length control field |
tz |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
170316t2017 th ||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781680944624 |
| 049 ## - LOCAL HOLDINGS (OCLC) |
| Holding library |
PIMLIB |
| 050 ## - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
T58 |
| Item number |
.G381 |
| 100 ## - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Gacovski, Zoran |
| 9 (RLIN) |
50663 |
| 245 ## - TITLE STATEMENT |
| Title |
Principles of Information Security |
| Statement of responsibility, etc. |
Ph.D. Prof. Dr. Zoran Gacovski |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. |
| Place of publication, distribution, etc. |
New York : |
| Name of publisher, distributor, etc. |
united states of america, |
| Date of publication, distribution, etc. |
2017. |
| -- |
50664 |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
184 p |
| 449 ## - |
| -- |
New Arrinals-Mar.2017 |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
"The need for computer and network security dates since the '80-s of the last century. The first computer networks were local and in an academic setting, so there was large confidence among users associated with them (there were almost no security problems). With the sudden development of the information technology and the today's Internet, the first abuses occurred along with the need to protect private and corporate data. Today, information safety is crucial and it is most evident especially in the e-commerce and e-business. The information is a vital corporate's property and it has enormous value. The information security, primarily comprising computer and the network security, is mainly concerned with the data protection (privacy), data integrity and data availability. This edition covers main security concepts, such as authentication methods, intrusion detection and prevention, cloud security protocols, and cryptography." |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
computer and network security |
| 9 (RLIN) |
50665 |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
information technology |
| 9 (RLIN) |
2206 |
| 690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) |
| Topical term or geographic name as entry element |
0021 วิทยาศาสตร์บัณฑิต สาขาเทคโนโลยีสารสนเทศ IT (ป.ตรี) |
| 9 (RLIN) |
64 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Koha item type |
หนังสือ |
| 988 ## - |
| -- |
824560 |
| 998 ## - LOCAL CONTROL INFORMATION (RLIN) |
| -- |
benjamad |