Security in a Web 2.0+ world : (Record no. 3086)
[ view plain ]
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
|---|---|
| fixed length control field | 100301s2009 enk 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
| LC control number | 2009009709 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9780470745755 (pbk. : alk. paper) |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (Sirsi) u4093 |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| Edition number | 22 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Solari, C. |
| Fuller form of name | (Carlos) |
| 9 (RLIN) | 8097 |
| 245 10 - TITLE STATEMENT | |
| Title | Security in a Web 2.0+ world : |
| Remainder of title | a standards based approach / |
| Statement of responsibility, etc. | C. Solari ; and contributors. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Chichester, West Sussex : |
| Name of publisher, distributor, etc. | Wiley, |
| Date of publication, distribution, etc. | 2009. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xviii, 249 p. : |
| Other physical details | ill. ; |
| Dimensions | 24 cm. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc. note | Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | The World of Cyber Security in 2019 -- The Costs and Impact of Cyber Security -- Protecting Web 2.0: What Makes it so Challenging? -- Limitations of the Present Models -- Defining the Solution – ITU-T X.805 Standard Explained -- Building the Security Foundation Using the ITU-T X.805 -- The Benefits of a Security Framework Approach -- Correcting Our Path – What Will it Take? |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Security Standards for a Web 2.0+ World clearly demonstrates how existing security solutions are failing to provide secure environments and trust between users and among organizations. Bringing together much needed information, and a broader view on why and how to deploy the appropriate standards. This book supports a shift in the current approach to information security, allowing companies to develop more mature models and achieve cost effective solutions to security challenges. |
| 596 ## - | |
| -- | 1 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Web 2.0 |
| General subdivision | Security measures |
| -- | Standards. |
| 9 (RLIN) | 8098 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer networks |
| General subdivision | Security measures |
| -- | Standards. |
| 9 (RLIN) | 8099 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer security |
| General subdivision | Standards. |
| 9 (RLIN) | 8100 |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Total Checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Main library | Main library | General Stacks | 01/26/2020 | ACA-P | 005.8 / SO.S 2009 | 006262 | 11/24/2019 | 1 | 11/24/2019 | Books |