Record ID | marc_nuls/NULS_PHC_180925.mrc:319750156:1604 |
Source | marc_nuls |
Download Link | /show-records/marc_nuls/NULS_PHC_180925.mrc:319750156:1604?format=raw |
LEADER: 01604cam 2200397Ia 4500
001 9920851260001661
005 20150423132021.0
008 080520s2010 caua b 000 0 eng d
020 $a1598296299 (pbk.)
020 $a9781598296297 (pbk.)
029 1 $aAU@$b000045964903
035 $a(CSdNU)u415554-01national_inst
035 $a(OCoLC)228425546
035 $a(OCoLC)228425546
035 $a(OCoLC)228425546
040 $aYDXCP$cYDXCP$dBTCTA$dBAKER$dORN$dBWX
049 $aCNUM
082 04 $a004
090 $aQA76.9.A25$bA528 2010
245 00 $aAnalysis techniques for information security /$cAnupam Datta ... [et al.].
260 $a[San Rafael, Calif] :$bMorgan & Claypool Publishers,$cc2010.
300 $aix, 152 p. :$bill ;$c24 cm.
490 1 $aSynthesis lectures on information security, privacy, and trust, $x1945-9742 ;$v# 2
504 $aIncludes bibliographical references (p. 133-149).
650 0 $aComputer security$xMathematical models.
650 0 $aData protection$xMathematical models.
700 1 $aDatta, Anupam.
830 0 $aSynthesis lectures on information security, privacy and trust ;$v# 2.
938 $aYBP Library Services$bYANK$n2816405
938 $aBaker and Taylor$bBTCP$nBK0007811544
938 $aBaker & Taylor$bBKTY$c40.00$d40.00$i1598296299$n0007811544$sactive
938 $aBlackwell Book Service$bBBUS$nR3857035$c$40.00
947 $fSOET-CIS$hCIRCSTACKS$p$38.00$q1
949 $aQA76.9.A25 A528 2010$i31786102629257
994 $a92$bCNU
999 $aQA 76.9 .A25 A528 2010$wLC$c1$i31786102629257$lCIRCSTACKS$mNULS$rY$sY $tBOOK$u9/28/2010