MARC details
000 -LEADER |
fixed length control field |
02187cam a22003378a 4500 |
001 - CONTROL NUMBER |
control field |
16547261 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20140207020002.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
Hard bound |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
101119s2011 pau b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2010046637 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781609602000 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(DLC)16547261 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(DLC)2010046637 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Transcribing agency |
DLC |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
HD30.2 |
Item number |
.S437 2011 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
22 |
Item number |
NE-S |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Nemati, Hamid R |
9 (RLIN) |
10468 |
245 00 - TITLE STATEMENT |
Title |
Security and privacy assurance in advancing technologies |
Remainder of title |
new developments |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Hershey |
Name of publisher, distributor, etc |
Information Science Reference |
Date of publication, distribution, etc |
2011 |
263 ## - PROJECTED PUBLICATION DATE |
Projected publication date |
1111 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxxvii,456p. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Re-evaluation of on-line hot topic discover model / Hui-min Ye, Sushil Sharma, Huinan Xu -- Understanding user behavior toward passwords through acceptance and use modelling / Lee Novakovic, Tanya McGill, Michael Dixon -- Privacy loss : an expanded model of legal and illegal data exchange / Joanne H. Pratt, Joanne H. Pratt -- Do privacy statements really work? : the effect of privacy statements and fair information practices on trust and perceived risk in e-commerce / Hamid Nemati -- Thomas van Dyke -- Large key sizes and the security of password-based cryptography / Kent Boklan -- Information systems security assurance management at municipal software solutions, Inc. / Virginia Kleist, Bonnie Morris, James W. Denton -- Security and privacy in e-mail bounce back systems / Alex Kosachev -- Hamid nemati. |
520 ## - SUMMARY, ETC. |
Summary, etc |
"This book provides a comprehensive collection of knowledge from experts within the field of information security and privacy and explores the changing roles of information technology and how this change will impact information security and privacy"--Provided by publisher. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Information technology |
General subdivision |
Security measures. |
9 (RLIN) |
10469 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Management |
General subdivision |
Technological innovations. |
9 (RLIN) |
10470 |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
0 |
b |
vip |
c |
orignew |
d |
1 |
e |
ecip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Print |
Koha issues (borrowed), all copies |
1 |