<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>01587nam a2200241 a 4500</leader>
  <controlfield tag="001">1/42621</controlfield>
  <controlfield tag="008">120608s2011    xxu a    b    001 0 eng  </controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9781118027974 (e-book : PDF)</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="l">45489</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
   <subfield code="a">DLC</subfield>
   <subfield code="c">DLC</subfield>
   <subfield code="d">DLC</subfield>
   <subfield code="d">GR-PeUP</subfield>
  </datafield>
  <datafield tag="041" ind1=" " ind2=" ">
   <subfield code="a">eng</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
   <subfield code="a">Stamp, Mark.</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
   <subfield code="a">Information security</subfield>
   <subfield code="h">[electronic resource] :</subfield>
   <subfield code="b">principles and practice /</subfield>
   <subfield code="c">Mark Stamp.</subfield>
  </datafield>
  <datafield tag="250" ind1=" " ind2=" ">
   <subfield code="a">2η έκδ.</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
   <subfield code="a">Hoboken, N.J. :</subfield>
   <subfield code="b">Wiley,</subfield>
   <subfield code="c">c2011.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">Ένα html e-book.</subfield>
  </datafield>
  <datafield tag="504" ind1=" " ind2=" ">
   <subfield code="a">Περιέχει βιβλιογραφία και ευρετήριο.</subfield>
  </datafield>
  <datafield tag="520" ind1="0" ind2=" ">
   <subfield code="a">&quot;&quot;Featuring a wide array of new information on the most current security topics, this book provides everything readers need to tackle any information security challenge. Focusing on cryptography, access control, protocols and software, this Second Edition features a greatly expanded set of homework problems; an appendix that covers necessary background information, like networking basics; a solutions manual and a comprehensive set of classroom-tested PowerPoint slides; and many new figures, tables, and graphs to clarify complex topics and problems. Students and instructors in information technology, computer science, and engineering, as well as professionals in these fields will depend on this text&quot;--</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Computer security.</subfield>
  </datafield>
  <datafield tag="655" ind1=" " ind2="4">
   <subfield code="a">Electronic books.</subfield>
  </datafield>
  <datafield tag="852" ind1=" " ind2=" ">
   <subfield code="a">INST</subfield>
   <subfield code="b">UNIPILB</subfield>
   <subfield code="c">EBOOKS</subfield>
   <subfield code="e">20120608</subfield>
   <subfield code="p">00b45489</subfield>
   <subfield code="q">00b45489</subfield>
   <subfield code="t">ONLINE</subfield>
   <subfield code="y">0</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="0">
   <subfield code="u">http://onlinelibrary.wiley.com/book/10.1002/9781118027974</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/03/45489_9781118027974.jpg</subfield>
   <subfield code="z">(e-book : PDF)</subfield>
  </datafield>
 </record>
</collection>
