| 000 | 01082nam a2200325Ia 4500 | ||
|---|---|---|---|
| 003 | OSt | ||
| 005 | 20220912145328.0 | ||
| 006 | a|||||r|||| 00| 0 | ||
| 007 | ta | ||
| 008 | 220909b |||||||| |||| 00| 0 eng d | ||
| 020 | _a9781584888628 (hbd) | ||
| 024 | _a125094 | ||
| 037 | _b3711, 14/03/2011, New India Book Agency | ||
| 037 | _cTextbook | ||
| 040 |
_aCSL _beng _cCSL |
||
| 041 | _aeng | ||
| 082 | _aD65,8(B):(894), Q1 TD | ||
| 100 | _aChin Shiu-Kai | ||
| 245 | 0 | _aAccess control security and trust: A logical approach | |
| 260 |
_aBoca Raton _bCRC Pres _c2011 |
||
| 300 |
_axxi, 329p. _ccm. |
||
| 490 | _aChapman and Hall/CRC cryptography and network security | ||
| 500 | _aIncludes bibliographical references.; Bibliography 321-323p.; Index 324-329p. | ||
| 650 | _a Computers-access control | ||
| 650 | _a System design | ||
| 650 | _aComputer Science | ||
| 700 | _a Older Susan | ||
| 942 |
_hD65,8(B):(894), Q1 TD _cTB _2CC |
||
| 999 |
_c29032 _d29032 |
||