Designing secure web-based applications for Microsoft Windows 2000 / (Record no. 7673)

MARC details
000 -LEADER
fixed length control field 01586nam a2200241Ia 4500
003 - CONTROL NUMBER IDENTIFIER
control field KPTM
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210419105115.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 130705s9999 xx 000 0 und d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 7356099950
040 ## - CATALOGING SOURCE
Transcribing agency KPTM
050 #0 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.888
Item number .H66 2000
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Howard, Michael
9 (RLIN) 10023
245 10 - TITLE STATEMENT
Title Designing secure web-based applications for Microsoft Windows 2000 /
Statement of responsibility, etc. Michael Howard; Marc Levy; Richard Waymire
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. Redmond, Wash. :
Name of publisher, distributor, etc. Microsoft Press,
Date of publication, distribution, etc. 2000.
300 ## - PHYSICAL DESCRIPTION
Extent xvii, 504 pages :
Other physical details illustrations ;
Dimensions 24 cm
Accompanying material + 1 CD-ROM (4 3/4 in.)
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Ch. 1. Security 101. Why Build Secure Applications? Security Defined. Why is Security Difficult? The Golden Rules (and Some Others). Threats, Safeguards, Vulnerabilities, and Attacks --<br/>Ch. 2. A Process for Building Secure Web Applications. A Security Design Process. Application Design. An Example --<br/>Ch. 3. Windows 2000 Security Overview. The Impact of Active Directory. Authenticated Logon. Authentication. Privileges. User Accounts and Groups. Domains and Workgroups. DOMAIN/Account Names and User Principal Names. Managing Accounts. Security Identifiers (SIDs). Tokens. Access Control Lists. Impersonation. Delegation. Miscellaneous Windows 2000 Security Features --<br/>Ch. 4. Internet Explorer Security Overview. Privacy.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Microsoft Windows (Computer file)
9 (RLIN) 10024
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element World Wide Web
General subdivision Security measures.
9 (RLIN) 10025
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Web sites
General subdivision Security measures.
9 (RLIN) 10026
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Levy, Marc
9 (RLIN) 10027
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Waymire, Richard
9 (RLIN) 10028
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Call number prefix TK5105.888.H66 2000
Koha item type Open Shelf Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Shelving control number Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Library of Congress Classification     Books Al-Ghazali Library Al-Ghazali Library Available to Loan 10/07/2013 Technology (General), Engineering (General), construction, Electrical , Motor vehicles. Aeronautics. Astronautics, Photography, Manufactures, Handicrafts. Arts and crafts, Home economics,   TK5105.888.H66 2000 012509 10/07/2013 10/07/2013 Open Shelf Books
    Library of Congress Classification     Media Collections Al-Ghazali Library Al-Ghazali Library Media Collections 19/04/2021 Technology (General), Engineering (General), construction, Electrical , Motor vehicles. Aeronautics. Astronautics, Photography, Manufactures, Handicrafts. Arts and crafts, Home economics,   TK5105.888.H66 2000   19/04/2021 19/04/2021 Media Collections