Principles of information security / (Record no. 4020)

MARC details
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 090423s2008 maua b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780840031167
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) u5020
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaNU
Transcribing agency EG-CaNU
Modifying agency EG-CaNU
042 ## - AUTHENTICATION CODE
Authentication code ncode
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Whitman, Michael E.,
Dates associated with a name 1964-
9 (RLIN) 1772
245 10 - TITLE STATEMENT
Title Principles of information security /
Statement of responsibility, etc. Michael E. Whitman, Herbert J. Mattord.
250 ## - EDITION STATEMENT
Edition statement 3rd ed.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note ch. 1. Introduction to the management of information security -- ch. 2. Planning for security -- ch. 3. Planning for contingencies -- ch. 4. Information security policy -- ch. 5. Developing the security program -- ch. 6. Security management models and practices -- ch. 7. Risk management -- ch. 8. Risk management -- ch. 9. Protection mechanisms -- ch. 10. Personnel and security -- ch. 11. Law and ethics -- ch. 12. Information security project management.
520 ## - SUMMARY, ETC.
Summary, etc. Explore the field of information security and assurance with this valuable resource that focuses on both the managerial and technical aspects of the discipline. Principles of Information Security, International Edition builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills that information systems students need for their future roles as business decision-makers. Coverage includes key knowledge areas of the CISSP (Certified Information Systems Security Professional), as well as risk management, cryptography, physical security, and more. The third edition has retained the real-world examples and scenarios that made previous editions so successful, but has updated the content to reflect technology's latest capabilities and trends. With this emphasis on currency and comprehensive coverage, readers can feel confident that they are using a standards-based, content-driven resource to prepare them for their work in the field.
596 ## -
-- 1
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
9 (RLIN) 10024
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
9 (RLIN) 10025
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Management information systems
General subdivision Security measures.
9 (RLIN) 10026
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Mattord, Herbert J.
9 (RLIN) 1776
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main library Main library General Stacks 01/26/2020 PURCHASE   005.8 / WH.M 2009 007214 11/24/2019 1 11/24/2019 Books