Handbook on securing cyber-physical critical infrastructure (Record no. 133904)

MARC details
000 -LEADER
fixed length control field 01752nam a2200373 a 4500
001 - CONTROL NUMBER
control field 0000144755
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20171002061934.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m u
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 111024s2012 mau sbf 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
Canceled/invalid LC control number 2011038620
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780124158153
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780124159105 (e-book)
035 ## - SYSTEM CONTROL NUMBER
System control number (CaPaEBR)ebr10525038
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)775791709
040 ## - CATALOGING SOURCE
Original cataloging agency CaPaEBR
Transcribing agency CaPaEBR
050 14 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .H3533 2012eb
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
245 00 - TITLE STATEMENT
Title Handbook on securing cyber-physical critical infrastructure
Medium [electronic resource] /
Statement of responsibility, etc. Sajal Das, Krishna Kant, Nan Zhang (editors).
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Waltham, Mass. :
Name of publisher, distributor, etc. Elsevier/Morgan Kaufmann,
Date of publication, distribution, etc. 2012.
300 ## - PHYSICAL DESCRIPTION
Extent xxx, 817 p.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note pt. 1. Theoretical foundations -- pt. 2. Security for wireless mobile networks -- pt. 3. Security for sensor networks -- pt. 4. Platform secruity -- pt. 5. Cloud computing and data security -- pt. 6. Event monitoring and situation awareness -- pt. 7. Policy issues in security management -- pt. 8. Security in real-world systems.
533 ## - REPRODUCTION NOTE
Type of reproduction Electronic reproduction.
Place of reproduction Palo Alto, Calif. :
Agency responsible for reproduction ebrary,
Date of reproduction 2012.
Note about reproduction Available via World Wide Web.
-- Access may be limited to ebrary affiliated libraries.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures
Form subdivision Handbooks, manuals, etc.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
Form subdivision Handbooks, manuals, etc.
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
Source of term local
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Das, Sajal K.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kant, Krishna.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Zhang, Nan,
Dates associated with a name 1982-
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element ebrary, Inc.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://site.ebrary.com/lib/daystar/Doc?id=10525038">http://site.ebrary.com/lib/daystar/Doc?id=10525038</a>
Public note An electronic book accessible through the World Wide Web; click to view
908 ## - PUT COMMAND PARAMETER (RLIN)
Put command parameter 170314
942 00 - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Electronic Book

No items available.