Asia Pacific University Library catalogue


Data hiding : (Record no. 6825)

000 -LEADER
fixed length control field 01331nam a22002898a 4500
001 - CONTROL NUMBER
control field 1ssj0000755432
003 - CONTROL NUMBER IDENTIFIER
control field APU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20150323114026.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr n
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 121109s2013 mau sb 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781597497435 (pbk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (WaSeSS)ssj0000755432
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency SUE
Language of cataloging eng
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number R34 2013
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
Item number RAG 2013
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Raggo, Michael T.
9 (RLIN) 12489
245 10 - TITLE STATEMENT
Title Data hiding :
Remainder of title exposing concealed data in multimedia, operating systems, mobile devices, and network protocols /
Statement of responsibility, etc Michael T. Raggo and Chet Hosmer.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Waltham, MA :
Name of publisher, distributor, etc Syngress,
Date of publication, distribution, etc c2013.
300 ## - PHYSICAL DESCRIPTION
Extent xx, 245 p. :
Other physical details ill. ;
Dimensions 23 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note History of data hiding -- Mobile device data hiding -- Windows operating system data hiding -- Linux operating system data hiding -- Storage devices -- Virtual machine hiding -- Steganography -- Forensics/anti-forensics techniques and detecting hidden data -- Hardware data hiding -- Multimedia data hiding and detection -- Parallel processing attacks -- Jamming methods.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
9 (RLIN) 76
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection.
9 (RLIN) 680
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Hosmer, Chet.
9 (RLIN) 12490
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Book
Koha issues (borrowed), all copies 4
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Use restrictions Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Invoice number Cost, normal purchase price Total Checkouts Total Renewals Full call number Barcode Date last seen Date checked out Copy number Cost, replacement price Price effective from Koha item type PO number
Not Withdrawn Available   Not Damaged No use restrictions Available for loan Book APU Library APU Library Open Shelf 02/08/2013 EMO A134955 | A134955 129.00 8 9 QA76.9.A25 R34 2013 c.1 00030184 18/01/2023 05/01/2023 1 129.00 02/08/2013 General Circulation PO # U-2013/05/0183 - KLIBF 2013 requested by ehsan rana