<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd" xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>00000cam a22000004a 4500</leader>
  <controlfield tag="001">UP-1685675941123864802</controlfield>
  <controlfield tag="003">Buklod</controlfield>
  <controlfield tag="005">20110727163724.0</controlfield>
  <controlfield tag="006">aa    rb   |||1 u|</controlfield>
  <controlfield tag="007">ta</controlfield>
  <controlfield tag="008">110727s        xx     d     r    |||| u|</controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">0131857940</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="a">(iLib)UPTAC-00009314832</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
   <subfield code="a">UPVTC</subfield>
  </datafield>
  <datafield tag="041" ind1=" " ind2=" ">
   <subfield code="a">eng</subfield>
  </datafield>
  <datafield tag="090" ind1=" " ind2="0">
   <subfield code="a">QA 76.73</subfield>
   <subfield code="b">P44 1997</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
   <subfield code="a">Pfleeger, Charles</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
   <subfield code="a">Security in computing.</subfield>
  </datafield>
  <datafield tag="250" ind1=" " ind2=" ">
   <subfield code="a">2nd ed.</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2="1">
   <subfield code="a">Upper Saddle NJ</subfield>
   <subfield code="b">Prentice-Hall International</subfield>
   <subfield code="c">cc1997</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">xviii, 574 p.</subfield>
  </datafield>
  <datafield tag="505" ind1="0" ind2=" ">
   <subfield code="a">Table of Contents: Preface -- 1. Is There a Security Problem in Computing? -- 2. Basic Encryption and Decryption -- 3. Secure Encryption Systems -- 4. Using Encryption: Protocols and Practices -- 5. Program Security -- 6. Protection in General-Purpose Operating Systems -- 7. Designing Trusted Operating Systems -- 8. Data Base Security -- 9. Security in Networks and Distributed Systems -- 10. Administering Security -- 11. Legal and Ethical Issues in Computer Security -- Bibliography. Index.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Computer security.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Data protection.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Privacy, Right of.</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="1">
   <subfield code="3">Table of contents only</subfield>
   <subfield code="u">https://drive.google.com/file/d/1nfRZAcjxoNv-_IVQUDKWBZd4zm-tEMpa/view?usp=sharing</subfield>
  </datafield>
  <datafield tag="905" ind1=" " ind2=" ">
   <subfield code="a">FO</subfield>
  </datafield>
  <datafield tag="852" ind1="0" ind2=" ">
   <subfield code="a">UPTAC</subfield>
   <subfield code="b">UPTAC</subfield>
   <subfield code="h">QA 76.73 P44 1997</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
   <subfield code="a">Book</subfield>
  </datafield>
 </record>
</collection>
