Principles of information security / (Record no. 4020)
[ view plain ]
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
|---|---|
| fixed length control field | 090423s2008 maua b 001 0 eng |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9780840031167 |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (Sirsi) u5020 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | EG-CaNU |
| Transcribing agency | EG-CaNU |
| Modifying agency | EG-CaNU |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | ncode |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| Edition number | 22 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Whitman, Michael E., |
| Dates associated with a name | 1964- |
| 9 (RLIN) | 1772 |
| 245 10 - TITLE STATEMENT | |
| Title | Principles of information security / |
| Statement of responsibility, etc. | Michael E. Whitman, Herbert J. Mattord. |
| 250 ## - EDITION STATEMENT | |
| Edition statement | 3rd ed. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc. note | Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | ch. 1. Introduction to the management of information security -- ch. 2. Planning for security -- ch. 3. Planning for contingencies -- ch. 4. Information security policy -- ch. 5. Developing the security program -- ch. 6. Security management models and practices -- ch. 7. Risk management -- ch. 8. Risk management -- ch. 9. Protection mechanisms -- ch. 10. Personnel and security -- ch. 11. Law and ethics -- ch. 12. Information security project management. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Explore the field of information security and assurance with this valuable resource that focuses on both the managerial and technical aspects of the discipline. Principles of Information Security, International Edition builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills that information systems students need for their future roles as business decision-makers. Coverage includes key knowledge areas of the CISSP (Certified Information Systems Security Professional), as well as risk management, cryptography, physical security, and more. The third edition has retained the real-world examples and scenarios that made previous editions so successful, but has updated the content to reflect technology's latest capabilities and trends. With this emphasis on currency and comprehensive coverage, readers can feel confident that they are using a standards-based, content-driven resource to prepare them for their work in the field. |
| 596 ## - | |
| -- | 1 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer networks |
| General subdivision | Security measures. |
| 9 (RLIN) | 10024 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer security. |
| 9 (RLIN) | 10025 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Management information systems |
| General subdivision | Security measures. |
| 9 (RLIN) | 10026 |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Mattord, Herbert J. |
| 9 (RLIN) | 1776 |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Total Checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Main library | Main library | General Stacks | 01/26/2020 | PURCHASE | 005.8 / WH.M 2009 | 007214 | 11/24/2019 | 1 | 11/24/2019 | Books |