000 | 00991nam a22003137a 4500 | ||
---|---|---|---|
001 | 20561919 | ||
003 | IIITD | ||
005 | 20221112112426.0 | ||
008 | 180628t20192019maua b 001 0 eng d | ||
010 | _a 2018950017 | ||
020 | _a9780321712332 | ||
035 | _a(OCoLC)on1076675266 | ||
040 |
_aYDX _beng _cYDX _erda _dRRR _dZYU _dOCLCF _dDLC |
||
042 | _alccopycat | ||
050 | 0 | 0 |
_aQA76.9.A25 _bB56 2019 |
082 |
_aREF 005.8 _bBIS-C |
||
100 | 1 | _aBishop, Matt | |
245 | 1 | 0 |
_aComputer security : _bart and science _cby Matt Bishop |
250 | _a2nd ed. | ||
260 |
_aNew Delhi : _bAddison-Wesley, _c©2019 |
||
300 |
_axlix, 1383 p. : _bill ; _c24 cm |
||
500 | _aIncludes bibliographical references (pages 1251-1339) and index. | ||
650 | 0 | _aComputer security. | |
650 | 0 | _aSecurity policies | |
650 | 0 | _aimplementation cryptography | |
906 |
_a7 _bcbc _ccopycat _d2 _eepcn _f20 _gy-gencatlg |
||
942 |
_2ddc _cBK |
||
999 |
_c157564 _d157564 |