<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>01833cam a2200313 a 4500</leader>
  <controlfield tag="001">1/43999</controlfield>
  <controlfield tag="008">131101s2012    enka     b    001 0 eng  </controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9781609608514 (hbk.)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9781609608521 (ebook)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9781609608538 (print &amp; perpetual access)</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="l">46931</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
   <subfield code="a">DLC</subfield>
   <subfield code="c">DLC</subfield>
   <subfield code="d">GR-PeUP</subfield>
  </datafield>
  <datafield tag="082" ind1="0" ind2="0">
   <subfield code="a">005.8 CYB</subfield>
  </datafield>
  <datafield tag="245" ind1="0" ind2="0">
   <subfield code="a">Cyber security standards, practices and industrial applications :</subfield>
   <subfield code="b">systems and methodologies /</subfield>
   <subfield code="c">Junaid Ahmed Zubairi, Athar Mahboob, editors.</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
   <subfield code="a">Hershey, PA :</subfield>
   <subfield code="b">Information Science Reference,</subfield>
   <subfield code="c">c2012.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">xviii, 316 σ. :</subfield>
   <subfield code="b">εικ. ;</subfield>
   <subfield code="c">29 εκ.</subfield>
  </datafield>
  <datafield tag="500" ind1=" " ind2=" ">
   <subfield code="a">&quot;Premier reference source&quot;--P. [1] of cover.</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
   <subfield code="a">&quot;This book details the latest and most important advances in security standards, introducing the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter around networks for intrusion detection and avoidance)&quot;--Provided by publisher.</subfield>
  </datafield>
  <datafield tag="504" ind1=" " ind2=" ">
   <subfield code="a">Περιέχει βιβλιογραφία και ευρετήριο.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Computer networks</subfield>
   <subfield code="x">Security measures.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Computer security.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Data protection.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Electronic data processing departments</subfield>
   <subfield code="x">Security measures.</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Zubairi, Junaid Ahmed,</subfield>
   <subfield code="d">1961-</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Mahboob, Athar,</subfield>
   <subfield code="d">1971-</subfield>
  </datafield>
  <datafield tag="852" ind1=" " ind2=" ">
   <subfield code="a">INST</subfield>
   <subfield code="b">UNIPILB</subfield>
   <subfield code="c">MAIN</subfield>
   <subfield code="e">20131101</subfield>
   <subfield code="h">005.8 CYB</subfield>
   <subfield code="p">00169792</subfield>
   <subfield code="q">00169792</subfield>
   <subfield code="t">LOAN</subfield>
   <subfield code="y">4</subfield>
   <subfield code="x">20220115</subfield>
   <subfield code="4">1</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/03/46931_9781609608514.jpg</subfield>
   <subfield code="z">(hbk.)</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/03/46931_9781609608521.jpg</subfield>
   <subfield code="z">(ebook)</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/03/46931_9781609608538.jpg</subfield>
   <subfield code="z">(print &amp; perpetual access)</subfield>
  </datafield>
 </record>
</collection>
