Security Patterns in Practice (Titelsatznr. 22019)

[ MARC ]
000 -LEADER
fixed length control field 01689nam a22003373u 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20150623165358.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |n|
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140416s2013 xx s||||||00 ||eng|d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119998945
040 ## - CATALOGING SOURCE
Original cataloging agency CaNSHNOV
Language of cataloging eng
060 ## - NATIONAL LIBRARY OF MEDICINE CALL NUMBER
Item number F S
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
084 ## - OTHER CLASSIFICATION NUMBER
Classification number 005.8
Item number F S
001 - CONTROL NUMBER
control field 0000116429
003 - CONTROL NUMBER IDENTIFIER
control field 0000
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Fernandez-Buglioni, Eduardo.
245 10 - TITLE STATEMENT
Title Security Patterns in Practice
Medium [[Book] :]
Remainder of title Designing Secure Architectures Using Software Patterns /
Statement of responsibility, etc. Eduardo Fernandez-Buglioni.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. Hoboken :
Name of publisher, distributor, etc. Wiley,
Date of publication, distribution, etc. 2013.
300 ## - PHYSICAL DESCRIPTION
Extent xxi,558 p :
Other physical details ill ;
Dimensions 25 cm.
490 1# - SERIES STATEMENT
Series statement Wiley Software Patterns Series
500 ## - GENERAL NOTE
General note Description based upon print version of record.
520 ## - SUMMARY, ETC.
Summary, etc. Learn to combine security theory and code to produce secure systems Security is clearly a crucial issue to consider during the design and implementation of any distributed software architecture. Security patterns are increasingly being used by developers who take security into serious consideration from the creation of their work. Written by the authority on security patterns, this unique book examines the structure and purpose of security patterns, illustrating their use with the help of detailed implementation advice, numerous code samples, and descriptions in UML. Provides.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer architecture.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks -- Security measures.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element Ebooks Corporation.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://msvu.eblib.com/patron/FullRecord.aspx?p=1245159
Link text Check for Full Text
Public note Access restricted: MSVU users only
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
Exemplare
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Cost, normal purchase price Full call number Barcode Date last seen Copy number Uniform Resource Identifier Price effective from Koha item type
        6october 6october 1105 2014-04-16 384.00 005.8 F S SOULE105010687 2021-08-29 1 Out 2015-06-23 Books
www.soul.o6u.edu.eg

E-Mail: soul@o6u.edu.eg
Address: October 6 city – Central Axis – Next to El Hosary mosque.
Tell: (+202) 38376382
Fax: (+202) 38376280



Developed and implemented by ILC EG