Security in a Web 2.0+ world : (Record no. 3086)

MARC details
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100301s2009 enk 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2009009709
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780470745755 (pbk. : alk. paper)
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) u4093
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Solari, C.
Fuller form of name (Carlos)
9 (RLIN) 8097
245 10 - TITLE STATEMENT
Title Security in a Web 2.0+ world :
Remainder of title a standards based approach /
Statement of responsibility, etc. C. Solari ; and contributors.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Chichester, West Sussex :
Name of publisher, distributor, etc. Wiley,
Date of publication, distribution, etc. 2009.
300 ## - PHYSICAL DESCRIPTION
Extent xviii, 249 p. :
Other physical details ill. ;
Dimensions 24 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note The World of Cyber Security in 2019 -- The Costs and Impact of Cyber Security -- Protecting Web 2.0: What Makes it so Challenging? -- Limitations of the Present Models -- Defining the Solution – ITU-T X.805 Standard Explained -- Building the Security Foundation Using the ITU-T X.805 -- The Benefits of a Security Framework Approach -- Correcting Our Path – What Will it Take?
520 ## - SUMMARY, ETC.
Summary, etc. Security Standards for a Web 2.0+ World clearly demonstrates how existing security solutions are failing to provide secure environments and trust between users and among organizations. Bringing together much needed information, and a broader view on why and how to deploy the appropriate standards. This book supports a shift in the current approach to information security, allowing companies to develop more mature models and achieve cost effective solutions to security challenges.
596 ## -
-- 1
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Web 2.0
General subdivision Security measures
-- Standards.
9 (RLIN) 8098
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures
-- Standards.
9 (RLIN) 8099
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
General subdivision Standards.
9 (RLIN) 8100
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main library Main library General Stacks 01/26/2020 ACA-P   005.8 / SO.S 2009 006262 11/24/2019 1 11/24/2019 Books