000 -LEADER |
fixed length control field |
01689nam a22003373u 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20150623165358.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS |
fixed length control field |
m d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr |n| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
140416s2013 xx s||||||00 ||eng|d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781119998945 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
CaNSHNOV |
Language of cataloging |
eng |
060 ## - NATIONAL LIBRARY OF MEDICINE CALL NUMBER |
Item number |
F S |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
084 ## - OTHER CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
F S |
001 - CONTROL NUMBER |
control field |
0000116429 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
0000 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Fernandez-Buglioni, Eduardo. |
245 10 - TITLE STATEMENT |
Title |
Security Patterns in Practice |
Medium |
[[Book] :] |
Remainder of title |
Designing Secure Architectures Using Software Patterns / |
Statement of responsibility, etc. |
Eduardo Fernandez-Buglioni. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc. |
Hoboken : |
Name of publisher, distributor, etc. |
Wiley, |
Date of publication, distribution, etc. |
2013. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxi,558 p : |
Other physical details |
ill ; |
Dimensions |
25 cm. |
490 1# - SERIES STATEMENT |
Series statement |
Wiley Software Patterns Series |
500 ## - GENERAL NOTE |
General note |
Description based upon print version of record. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Learn to combine security theory and code to produce secure systems Security is clearly a crucial issue to consider during the design and implementation of any distributed software architecture. Security patterns are increasingly being used by developers who take security into serious consideration from the creation of their work. Written by the authority on security patterns, this unique book examines the structure and purpose of security patterns, illustrating their use with the help of detailed implementation advice, numerous code samples, and descriptions in UML. Provides. |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer architecture. |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks -- Security measures. |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
655 #0 - INDEX TERM--GENRE/FORM |
Genre/form data or focus term |
Electronic books. |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
Ebooks Corporation. |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
http://msvu.eblib.com/patron/FullRecord.aspx?p=1245159 |
Link text |
Check for Full Text |
Public note |
Access restricted: MSVU users only |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Books |