Cyber security in parallel and distributed computing : (Record no. 58212)

000 -LEADER
fixed length control field 16872cam a2200517 i 4500
001 - CONTROL NUMBER
control field 20837516
003 - CONTROL NUMBER IDENTIFIER
control field CITU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20231013165231.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m |o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |n|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190204s2019 nju ob 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2019005079
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119488316
Qualifying information (ePub)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781119488330
Qualifying information (ebook)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions rda
Transcribing agency DLC
Modifying agency DLC
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng.
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 10 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
245 00 - TITLE STATEMENT
Title Cyber security in parallel and distributed computing :
Remainder of title concepts, techniques, applications and case studies /
Statement of responsibility, etc. edited by DacNhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Manju Khari, Jyotir Moy Chatterjee.
250 ## - EDITION STATEMENT
Edition statement First edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Hoboken, NJ :
Name of producer, publisher, distributor, manufacturer Scrivener Publishing/Wiley,
Date of production, publication, distribution, manufacture, or copyright notice 2019.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
500 ## - GENERAL NOTE
General note Author Bios<br/>Raghvendra Kumar completed his PhD in the Faculty of Engineering and Technology, Jodhpur National University, India. He has authored several research papers in Scopus indexed and impact factor research journals\international conferences as well as 6 authored and 9 edited books on computer science. His areas of interest include wireless sensor network (WSN), Internet of Things, mobile application programming, ad hoc networks, cloud computing, big data, mobile computing, data mining and software engineering.<br/><br/>Brojo Kishore Mishra is an Associate Professor at the C. V. Raman College of Engineering (Autonomous), Bhubaneswar, India. He received his PhD degree in Computer Science from the Berhampur University in 2012. He has published more than 40 research papers in peer-reviewed journals. His research interests include data mining and big data analysis, machine learning, soft computing, and evolutionary computation.<br/><br/>Jyotir Moy Chatterjee is working as an Assistant Professor in the Department of Computer Science and Engineering at GD-RCET, Bhilai, C.G, India. He received his M.Tech from KIIT University, Bhubaneswar, Odisha and B.Tech in Computer Science & Engineering from Dr. MGR Educational & Research Institute University, Chennai, (Tamil Nadu). His research interests include cloud computing, big data, privacy preservation and data mining.<br/><br/>Manju Khari is an Assistant Professor at the Ambedkar Institute of Advanced Communication Technology and Research, Delhi, India. She holds a PhD in Computer Science & Engineering from the National Institute of Technology Patna. She has published 60 papers in refereed national and international journals and conferences. Her research interests are in software testing, software quality, software metrics, information security and nature-inspired algorithms.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note TABLE OF CONTENTS<br/>List of Figures xv<br/><br/>List of Tables xvii<br/><br/>Foreword xix<br/><br/>Preface xxi<br/><br/>Acknowledgments xxv<br/><br/>Acronyms xxvii<br/><br/>Part 1 Cybersecurity Concept<br/><br/>1 Introduction on Cybersecurity 3<br/>Ishaani Priyadarshini<br/><br/>1.1 Introduction to Cybersecurity 5<br/><br/>1.2 Cybersecurity Objectives 6<br/><br/>1.3 Cybersecurity Infrastructure and Internet Architecture (NIST) 8<br/><br/>1.4 Cybersecurity Roles 10<br/><br/>1.5 Cybercrimes 17<br/><br/>1.5.1 Overview 17<br/><br/>1.5.2 Traditional Computer Crime and Contemporary Computer Crime 18<br/><br/>1.5.3 Combating Crimes 21<br/><br/>1.6 Security Models 23<br/><br/>1.7 Computer Forensics 25<br/><br/>1.8 Cyber Insurance 27<br/><br/>1.8.1 Digital Citizenship 29<br/><br/>1.8.2 Information Warfare and its Countermeasures 31<br/><br/>1.8.3 Network Neutrality 33<br/><br/>1.8.4 Good Practices and Policies 34<br/><br/>1.8.5 Cybersecurity and Human Rights 35<br/><br/>1.9 Future of Cybersecurity 36<br/><br/>1.10 Conclusion 36<br/><br/>References 37<br/><br/>2 Steganography and Steganalysis 39<br/>Ho Thi Huong Thom, Nguyen Kim Anh<br/><br/>2.1 Introduction 40<br/><br/>2.2 Steganography 41<br/><br/>2.2.1 Method for Evaluating Hidden Information Schema Security 41<br/><br/>2.2.2 Peak Signal-to-Noise Ratio 42<br/><br/>2.3 Steganalysis 42<br/><br/>2.3.1 Blind Detection Based on LSB 43<br/><br/>2.3.2 Constraint Steganalysis 45<br/><br/>2.4 Conclusion 46<br/><br/>References 46<br/><br/>3 Security Threats and Vulnerabilities in E-business 51<br/>Satya Narayan Tripathy, Sisira Kumar Kapat, Susanta Kumar Das<br/><br/>3.1 Introduction to e-Business 52<br/><br/>3.1.1 Benefits of e-Business 52<br/><br/>3.1.2 Business Revolution 53<br/><br/>3.2 Security Issues in e-Business 54<br/><br/>3.2.1 Vulnerabilities 54<br/><br/>3.2.2 Security Attacks 55<br/><br/>3.2.3 Malware as a Threat 55<br/><br/>3.3 Common Vulnerabilities in e-Business 55<br/><br/>3.3.1 Phishing 55<br/><br/>3.3.2 Cross-Site Scripting (XSS) 56<br/><br/>3.4 Threats in e-Business 56<br/><br/>3.4.1 Ransomware 56<br/><br/>3.4.2 Spyware 56<br/><br/>3.4.3 Worms 57<br/><br/>3.4.4 Trojan Horse 57<br/><br/>3.5 Prevention Mechanism 57<br/><br/>3.6 Conclusion 58<br/><br/>References 58<br/><br/>4 e-Commerce Security: Threats, Issues, and Methods 61<br/>Prerna Sharma, Deepak Gupta, Ashish Khanna<br/><br/>4.1 Introduction 62<br/><br/>4.2 Literature Review 63<br/><br/>4.3 e-Commerce 63<br/><br/>4.3.1 Characteristics of e-Commerce Technology 63<br/><br/>4.3.2 Architectural Framework of e-Commerce 64<br/><br/>4.3.3 Advantages and Disadvantages of e-Commerce 66<br/><br/>4.4 Security Overview in e-Commerce 67<br/><br/>4.4.1 Purpose of Security in e-Commerce 67<br/><br/>4.4.2 Security Element at Different Levels of e-Commerce System 67<br/><br/>4.5 Security Issues in e-Commerce 68<br/><br/>4.5.1 Client Level 68<br/><br/>4.5.2 Front-End Servers and Software Application Level 68<br/><br/>4.5.3 Network and Server Level 68<br/><br/>4.6 Security Threats in e-Commerce 69<br/><br/>4.7 Security Approaches in e-Commerce 72<br/><br/>4.8 Comparative Analysis of Various Security Threats in e-Commerce 73<br/><br/>4.9 e-Commerce Security Life-Cycle Model 73<br/><br/>4.10 Conclusion 75<br/><br/>References 76<br/><br/>5 Cyberwar is Coming 79<br/>T. Manikandan, B. Balamurugan, C. Senthilkumar, R. Rajesh Alias Harinarayan, R. Raja Subramanian<br/><br/>5.1 Introduction 80<br/><br/>5.2 Ransomware Attacks 82<br/><br/>5.2.1 Petya 83<br/><br/>5.2.2 WannaCry 83<br/><br/>5.2.3 Locky 84<br/><br/>5.3 Are Nations Ready? 85<br/><br/>5.4 Conclusion 88<br/><br/>References 88<br/><br/>Part 2 Cybersecurity in Parallel and Distributed Computing Techniques<br/><br/>6 Introduction to Blockchain Technology 93<br/>Ishaani Priyadarshini<br/><br/>6.1 Introduction 94<br/><br/>6.2 Need for Blockchain Security 95<br/><br/>6.3 Characteristics of Blockchain Technology 96<br/><br/>6.4 Types of Blockchains 97<br/><br/>6.5 The Architecture of Blockchain Technology 97<br/><br/>6.6 How Blockchain Technology Works 100<br/><br/>6.7 Some Other Case Studies for Blockchain Technology 102<br/><br/>6.8 Challenges Faced by Blockchain Technology 103<br/><br/>6.9 The Future of Blockchain Technology 105<br/><br/>6.10 Conclusion 106<br/><br/>References 106<br/><br/>7 Cyber-Security Techniques in Distributed Systems, SLAs and other Cyber Regulations 109<br/>Soumitra Ghosh, Anjana Mishra, Brojo Kishore Mishra<br/><br/>7.1 Introduction 110<br/><br/>7.1.1 Primary Characteristics of a Distributed System 110<br/><br/>7.1.2 Major Challenges for Distributed Systems 111<br/><br/>7.2 Identifying Cyber Requirements 112<br/><br/>7.3 Popular security mechanisms in Distributed Systems 113<br/><br/>7.3.1 Secure Communication 113<br/><br/>7.3.2 Message Integrity and Confidentiality 115<br/><br/>7.3.3 Access Controls 116<br/><br/>7.4 Service Level Agreements 118<br/><br/>7.4.1 Types of SLAs 118<br/><br/>7.4.2 Critical Areas for SLAs 119<br/><br/>7.5 The Cuckoo’s Egg in the Context of IT Security 122<br/><br/>7.6 Searching and Seizing ComputerRelated Evidence 124<br/><br/>7.6.1 Computerized Search Warrants 124<br/><br/>7.6.2 Searching and Seizing 125<br/><br/>7.7 Conclusion 126<br/><br/>References 126<br/><br/>8 Distributed Computing Security: Issues and Challenges 129<br/>Munmun Saha, Sanjaya Kumar Panda and Suvasini Panigrahi<br/><br/>8.1 Introduction 130<br/><br/>8.2 Security Issues and Challenges 131<br/><br/>8.2.1 Confidentiality, Integrity and Availability 131<br/><br/>8.2.2 Authentication and Access Control Issue 132<br/><br/>8.2.3 Broken Authentication, Session and Access 132<br/><br/>8.3 Security Issues and Challenges in Advanced Areas 133<br/><br/>8.4 Conclusion 136<br/><br/>References 136<br/><br/>9 Organization Assignment in Federated Cloud Environments based on Multi-Target Optimization of Security 139<br/>Abhishek Kumar, Palvadi Srinivas Kumar, T.V.M. Sairam<br/><br/>9.1 Introduction 140<br/><br/>9.2 Background Work Related to Domain 141<br/><br/>9.2.1 Basics on Cloud computing 141<br/><br/>9.2.2 Clouds Which are Federated 141<br/><br/>9.2.3 Cloud Resource Management 141<br/><br/>9.3 Architectural-Based Cloud Security Implementation 142<br/><br/>9.4 Expected Results of the Process 144<br/><br/>9.5 Conclusion 146<br/><br/>References 146<br/><br/>10 An On-Demand and User-friendly Framework for Cloud Data Centre Networks with Performance Guarantee 149<br/>P. Srinivas Kumar, Abhishek Kumar, Pramod Singh Rathore, Jyotir Moy Chatterjee<br/><br/>10.1 Introduction 150<br/><br/>10.1.1 Key Research Problems in This Area 150<br/><br/>10.1.2 Problems with Interoperability 151<br/><br/>10.2 Difficulties from a Cloud Adoption Perspective 151<br/><br/>10.3 Security and Privacy 151<br/><br/>10.3.1 Resource Provisioning 152<br/><br/>10.3.2 How Do We Define Cloud? 153<br/><br/>10.3.3 Public vs Private Cloud-Based Services 153<br/><br/>10.3.4 Traffic-Aware VM Migration to Load Balance Cloud Servers 154<br/><br/>10.4 Conclusion and Future Work 157<br/><br/>References 157<br/><br/>Part 3 Cybersecurity Applications and Case Studies<br/><br/>11 Cybersecurity at Organizations: A Delphi Pilot Study of Expert Opinions About Policy and Protection 163<br/>Holly Reitmeier, Jolanda Tromp, John Bottoms<br/><br/>11.1 Introduction 164<br/><br/>11.1.1 What is Cybercrime? 164<br/><br/>11.1.2 What is Cybersecurity? 165<br/><br/>11.1.3 Purpose of This Cybersecurity Pilot Study 165<br/><br/>11.1.4 Methods of Cybersecurity Professionals 165<br/><br/>11.2 Shocking Statistics of Cybercrime 166<br/><br/>11.2.1 Role of the Internet Crime Complaint Center 166<br/><br/>11.2.2 2016 Global Economic Crime Survey Report 168<br/><br/>11.2.3 Inadequate Preparation at Organizations 168<br/><br/>11.2.4 Organizations: Be Aware, Be Secure 168<br/><br/>11.3 Cybersecurity Policies for Organizations 169<br/><br/>11.3.1 Classification of Cybersecurity at an Organization 171<br/><br/>11.3.2 Pyramid of Cybersecurity 171<br/><br/>11.4 Blockchain Technology 172<br/><br/>11.5 Research Methodology 173<br/><br/>11.5.1 Quantitative and Qualitative Data Collection 173<br/><br/>11.5.2 Design of the Study 174<br/><br/>11.5.3 Selection of the Delphi Method 174<br/><br/>11.5.4 Procedure of Utilization of the Delphi Method 175<br/><br/>11.5.5 Delphi Activities (Iteration Rounds) of This Pilot Study 175<br/><br/>11.6 Results of the Cybersecurity Delphi Study 176<br/><br/>11.6.1 Results from Round One 176<br/><br/>11.6.2 Results of Round Two 178<br/><br/>11.6.3 Discussion and Limitations Based on the Results 181<br/><br/>11.7 Conclusion 183<br/><br/>11.7.1 The Literature in the Field 183<br/><br/>11.7.2 Next Steps for Future Research 184<br/><br/>References 184<br/><br/>12 Smartphone Triggered Security Challenges - Issues, Case Studies and Prevention 187<br/>Saurabh Ranjan Srivastava, Sachin Dube, Gulshan Shrivastava, Kavita Sharma<br/><br/>12.1 Introduction 188<br/><br/>12.2 Classification of Mobile Security Threats 188<br/><br/>12.2.1 Physical Threats 189<br/><br/>12.2.2 Web-Based Threats 189<br/><br/>12.2.3 Application-Based Threats 189<br/><br/>12.2.4 Network-Based Threats 190<br/><br/>12.2.5 Data Transfer-Based Threats 191<br/><br/>12.2.6 Improper Session Management-Based Threats 191<br/><br/>12.2.7 Bluetooth-Based Threats 191<br/><br/>12.2.8 Application Platform-Based Threats 192<br/><br/>12.3 Smartphones as a Tool of Crime 192<br/><br/>12.4 Types of Mobile Phone-Related Crimes 193<br/><br/>12.5 Types of Mobile Fraud 196<br/><br/>12.6 Case Studies 198<br/><br/>12.6.1 Mobile Identity Theft 198<br/><br/>12.6.2 Data Theft by Applications 200<br/><br/>12.6.3 SIM Card Fraud 200<br/><br/>12.7 Preventive Measures and Precautions 201<br/><br/>12.7.1 Against Physical Loss and Theft of the Mobile Device 201<br/><br/>12.7.2 Against SMiShing Attacks 202<br/><br/>12.7.3 Against App-Based Attacks 203<br/><br/>12.7.4 Against Identity Theft and SIM Card Fraud 203<br/><br/>12.8 Conclusion 204<br/><br/>References 205<br/><br/>13 Cybersecurity: A Practical Strategy Against Cyber Threats, Risks with Real World Usages 207<br/>Anjana Mishra, Soumitra Ghosh, Brojo Kishore Mishra<br/><br/>13.1 Introduction 208<br/><br/>13.2 Cyberwar 209<br/><br/>13.3 Arms Control in Cyberwar 210<br/><br/>13.4 Internet Security Alliance 211<br/><br/>13.5 Cybersecurity Information Sharing Act 212<br/><br/>13.6 Market for Malware 214<br/><br/>13.7 Mobile Cybersecurity 215<br/><br/>13.8 Healthcare 216<br/><br/>13.9 Human Rights 217<br/><br/>13.10 Cybersecurity Application in Our Life 218<br/><br/>13.11 Conclusion 219<br/><br/>References 219<br/><br/>14 Security in Distributed Operating System: A Comprehensive Study 221<br/>Sushree Bibhuprada B. Priyadarshini, Amiya Bhusan Bagjadab, Brojo Kishore Mishra<br/><br/>14.1 Introduction to Security and Distributed Systems 222<br/><br/>14.2 Relevant Terminology 225<br/><br/>14.3 Types of External Attacks 225<br/><br/>14.4 Globus Security Architecture 228<br/><br/>14.5 Distribution of Security Mechanism 229<br/><br/>14.6 Conclusions 230<br/><br/>References 230<br/><br/>15 Security in Healthcare Applications based on Fog and Cloud Computing 231<br/>Rojalina Priyadarshini, Mohit Ranjan Panda, Brojo Kishore Mishra<br/><br/>15.1 Introduction 232<br/><br/>15.2 Security Needs of Healthcare Sector 233<br/><br/>15.2.1 Data Integrity 233<br/><br/>15.2.2 Data Confidentiality 233<br/><br/>15.2.3 Authentication and Authorization 233<br/><br/>15.2.4 Availability 234<br/><br/>15.2.5 Access Control 234<br/><br/>15.2.6 Dependability 234<br/><br/>15.2.7 Flexibility 234<br/><br/>15.3 Solutions to Probable Attacks in e-Healthcare 234<br/><br/>15.3.1 Jamming Attack 235<br/><br/>15.3.2 Data Collision Attack 235<br/><br/>15.3.3 Desynchronization Attack 235<br/><br/>15.3.4 Spoofing Attack 236<br/><br/>15.3.5 Man-in-the-Middle Attack 236<br/><br/>15.3.6 Denial-of-Service (DoS) Attack 237<br/><br/>15.3.7 Insider Attack 238<br/><br/>15.3.8 Masquerade Attack 238<br/><br/>15.3.9 Attacks on Virtual Machine and Hypervisor 239<br/><br/>15.4 Emerging Threats in Cloud- and Fog-Based Healthcare System 240<br/><br/>15.4.1 Software Supply Chain Attacks 240<br/><br/>15.4.2 Ransomware Attacks 240<br/><br/>15.4.3 Crypto-Mining and Crypto-Jacking Malware 240<br/><br/>15.5 Conclusion 241<br/><br/>References 241<br/><br/>16 Mapping of e-Wallets with Features 245<br/>Alisha Sikri, Surjeet Dalal, N.P Singh, Dac-Nhuong Le<br/><br/>16.1 Introduction 246<br/><br/>16.1.1 e-Wallet 246<br/><br/>16.1.2 Objectives 247<br/><br/>16.2 Review of Literature 250<br/><br/>16.3 Market Share of e-Wallet 251<br/><br/>16.3.1 Technical Features 252<br/><br/>16.3.2 Legal Features 252<br/><br/>16.3.3 Operational Features 253<br/><br/>16.3.4 Security Features 253<br/><br/>16.4 Research Methodology 253<br/><br/>16.5 Result Analysis 255<br/><br/>16.6 Conclusions and future work 256<br/><br/>References 256
520 ## - SUMMARY, ETC.
Summary, etc. The main objective of this book is to explore the concept of cybersecurity in parallel and distributed computing along with recent research developments in the field. It also includes various real-time/offline applications and case studies in the fields of engineering and computer science and the modern tools and technologies used. Information on cybersecurity technologies is organized in the fifteen chapters of this book.<br/><br/>This important book cover subjects such as:<br/><br/>Research and solutions for the problem of hidden image detection<br/>Security aspects of data mining and possible solution techniques<br/>A comparative analysis of various methods used in e-commerce security and how to perform secure payment transactions in an efficient manner<br/>Blockchain technology and how it is crucial to the security industry<br/>Security for the Internet of Things<br/>Security issues and challenges in distributed computing security such as heterogeneous computing, cloud computing, fog computing, etc.<br/>Demonstrates the administration task issue in unified cloud situations as a multi-target enhancement issue in light of security<br/>Explores the concepts of cybercrime and cybersecurity and presents the statistical impact it is having on organizations<br/>Highlights some strategies for maintaining the privacy, integrity, confidentiality and availability of cyber information and its real-world impacts such as mobile security software for secure email and online banking, cyber health check programs for business, cyber incident response management, cybersecurity risk management<br/>Security policies and mechanisms, various categories of attacks (e.g., denial-of-service), global security architecture, along with distribution of security mechanisms<br/>Security issues in the healthcare sector with existing solutions and emerging threats.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on print version record and CIP data provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Parallel processing (Electronic computers)
Form subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Electronic data processing
General subdivision Distributed processing
Form subdivision Security measures.
655 ## - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Le, Dac-Nhuong,
Dates associated with a name 1983-
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kumar, Raghvendra,
Dates associated with a name 1987-
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Mishra, Brojo Kishore,
Dates associated with a name 1979-
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Khari, Manju,
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Chatterjee, Jyotir Moy,
Relator term editor.
856 ## - ELECTRONIC LOCATION AND ACCESS
Link text Full text is available at Wiley Online Library Click here to view
Uniform Resource Identifier <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a>
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c origcop
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type EBOOK
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Date acquired Source of acquisition Inventory number Full call number Barcode Date last seen Price effective from Koha item type
          COLLEGE LIBRARY COLLEGE LIBRARY 2021-03-10 Megatexts Phil. Inc. 50338 005.8 C9921 2019 CL-50338 2021-03-10 2021-03-10 EBOOK