<?xml version="1.0" encoding="UTF-8" ?>
<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xmlns:slims="http://slims.web.id" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
<mods version="3.3" id="4855">
 <titleInfo>
  <title>Information security :</title>
  <subTitle>principles and practice</subTitle>
 </titleInfo>
 <name type="Personal Name" authority="">
  <namePart>Stamp, Mark</namePart>
  <role>
   <roleTerm type="text">Primary Author</roleTerm>
  </role>
 </name>
 <typeOfResource manuscript="no" collection="yes">mixed material</typeOfResource>
 <genre authority="marcgt">bibliography</genre>
 <originInfo>
  <place>
   <placeTerm type="text">Hoboken, New Jersey</placeTerm>
   <publisher>Wiley</publisher>
   <dateIssued>2011</dateIssued>
  </place>
 </originInfo>
 <language>
  <languageTerm type="code">en</languageTerm>
  <languageTerm type="text">English</languageTerm>
 </language>
 <physicalDescription>
  <form authority="gmd">Text</form>
  <extent>xxi, 584 pages : illustrations ; 24 cm</extent>
 </physicalDescription>
 <note>&quot;Featuring a wide array of new information on the most current security topics, this book provides everything readers need to tackle any information security challenge. Focusing on cryptography, access control, protocols and software, this Second Edition features a greatly expanded set of homework problems; an appendix that covers necessary background information, like networking basics; a solutions manual and a comprehensive set of classroom-tested PowerPoint slides; and many new figures, tables, and graphs to clarify complex topics and problems. Students and instructors in information technology, computer science, and engineering, as well as professionals in these fields will depend on this text&quot;--</note>
 <note type="statement of responsibility"></note>
 <subject authority="">
  <topic>Computer Security</topic>
 </subject>
 <subject authority="">
  <topic>Sécurité informatique</topic>
 </subject>
 <classification>005.8</classification>
 <identifier type="isbn">9780470626399</identifier>
 <location>
  <physicalLocation>e-Library Universitas Pertamina Be Global Leader</physicalLocation>
  <shelfLocator>005.8 STA i</shelfLocator>
  <holdingSimple>
   <copyInformation>
    <numerationAndChronology type="1">8983/PUP/2019</numerationAndChronology>
    <sublocation>Perpustakaan Universitas Pertamina</sublocation>
    <shelfLocator>005.8 STA i c.3</shelfLocator>
   </copyInformation>
   <copyInformation>
    <numerationAndChronology type="1">8982/PUP/2019</numerationAndChronology>
    <sublocation>Perpustakaan Universitas Pertamina</sublocation>
    <shelfLocator>005.8 STA i c.2</shelfLocator>
   </copyInformation>
   <copyInformation>
    <numerationAndChronology type="1">8981/PUP/2019</numerationAndChronology>
    <sublocation>Perpustakaan Universitas Pertamina</sublocation>
    <shelfLocator>005.8 STA i c.1</shelfLocator>
   </copyInformation>
  </holdingSimple>
 </location>
 <slims:image>NAB_20220509_6.jpg.jpg</slims:image>
 <recordInfo>
  <recordIdentifier>4855</recordIdentifier>
  <recordCreationDate encoding="w3cdtf">2022-05-09 13:09:58</recordCreationDate>
  <recordChangeDate encoding="w3cdtf">2022-05-13 14:09:11</recordChangeDate>
  <recordOrigin>machine generated</recordOrigin>
 </recordInfo>
</mods>
</modsCollection>