Cyber security (Record no. 234484)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01478nam a22002177a 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250618143028.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 250618b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9788126521791 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | AL |
041 ## - LANGUAGE CODE | |
Language code of text/sound track or separate title | English |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Edition number | 23 |
Classification number | 005.8 |
Item number | GODC |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Nina Godbole |
9 (RLIN) | 215329 |
245 ## - TITLE STATEMENT | |
Title | Cyber security |
Remainder of title | : understanding cyber crimes computer forensics and legal perspectives |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | New Delhi |
Name of publisher, distributor, etc. | Wiley |
Date of publication, distribution, etc. | 2011 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xiv,588p. |
Other physical details | PB |
Dimensions | 24x18cm. |
365 ## - TRADE PRICE | |
Source of price type code | General |
Price type code | 1456 |
Price amount | ₹863.00 |
Currency code | ₹ |
Unit of pricing | ₹1079.00 |
Price note | 20% |
Price effective from | 17/06/2025 |
520 ## - SUMMARY, ETC. | |
Summary, etc. | · This book, focusing on cyberthreats and cybersecurity, provides the much needed awareness in the times of growing cybercrime episodes. · Comprehensive treatment of important topic - cybersecurity to help readers understand the implications of cybercrime. · The book provides adequate orientation on laws in reference to cybercrime and cybersecurity taking into account the Indian as well as global scenario. · Awareness created through simple practical tips and tricks, educates readers to learn how to avoid becoming victims of cybercrime. · Written by InfoSec domain SME and co-authored by qualified ethical hacking professional who is also a security certified. · Well-presented case illustrations and examples from real life to underline the significance of topics addressed in each chapter. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Source of heading or term | Computer Science |
Topical term or geographic name entry element | Cyber Security |
9 (RLIN) | 215330 |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Belapure,Sunit |
9 (RLIN) | 215331 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Book |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Date acquired | Source of acquisition | Cost, normal purchase price | Total Checkouts | Full call number | Barcode | Date last seen | Cost, replacement price | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | MAJMC | St Aloysius PG Library | St Aloysius PG Library | 06/18/2025 | Biblios Book Point | 863.00 | 005.8 GODC | PG025010 | 06/18/2025 | 1079.00 | Book |