Current security management & ethical issues of information technology / (Record no. 6714)
[ view plain ]
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
|---|---|
| fixed length control field | 101202s2003 paua b 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
| LC control number | 2002156229 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 1931777438 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 1931777594 |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (Sirsi) u7758 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | EG-CaNU |
| Transcribing agency | EG-CaNU |
| Modifying agency | EG-CaNU |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | ncode |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| Edition number | 21 |
| 245 00 - TITLE STATEMENT | |
| Title | Current security management & ethical issues of information technology / |
| Statement of responsibility, etc. | edited by Rasool Azari. |
| 246 3# - VARYING FORM OF TITLE | |
| Title proper/short title | Current security management and ethical issues of information technology |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Hershey : |
| Name of publisher, distributor, etc. | IRM Press, |
| Date of publication, distribution, etc. | c2003. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xiv, 289 p. : |
| Other physical details | ill. ; |
| Dimensions | 26 cm. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc. note | Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Chapter I. Network Security Software -- Chapter II. A Forensic Computing Perspective on the Need for Improved User Education for Information Systems Security Management -- Chapter III. Integrating Cooperative Engagement Capability into Network-Centric Information System Security -- Chapter IV. A Methodology for Developing Trusted Information Systems: The Security Requirements Analysis Phase -- Chapter V. A National Information Infrastructure Model for Information Warfare Defence -- Chapter VI. Biometrics: Past, Present and Future -- Chapter VII. User Types and Filter Effectiveness: A University Case Study -- Chapter VIII. What is the Social Responsibility in the Information Age? Maximising Profits? -- Chapter IX. The Social Contract Revised: Obligation and Responsibilityin the Information Society -- Chapter X. The Influence of Socioeconomic Factors on Technological Change: The Case of High-Tech States in the U.S. -- Chapter XI. Social Responsibility and the Transition Toward a Knowledge-Based Society in Latin America -- Chapter XII. Information Systems Ethics in the USA and in the Arab World -- Chapter XIII. Lemon Problems in the Internet Transactions and Relative Strategies -- Chapter XIV. Reputation, Reputation System and Reputation Distribution - An Exploratory Study in Online Consumer-to-Consumer Auctions -- Chapter XV. Privacy Perspective from Utilitarianism and Metaphysical Theories |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Corporate and individual behaviors are increasingly scrutinized as reports of scandals around the world are frequently becoming the subject of attention. Additionally, the security of data and information and ethical problems that arise when enforcing the appropriate security initiatives are becoming prevalent as well. Current Security Management & Ethical Issues of Information Technology focuses on these issues and more, at a time when the global society greatly needs to re-examine the existing policies and practices. |
| 598 ## - | |
| -- | APPSCIE, GWORKS |
| 596 ## - | |
| -- | 1 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer security. |
| 9 (RLIN) | 13936 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer networks |
| General subdivision | Security measures. |
| 9 (RLIN) | 13937 |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Azari, Rasool. |
| 9 (RLIN) | 13938 |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Total Checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Main library | Main library | General Stacks | 01/26/2020 | BAC_P | 005.8 / AZ.C 2003 | 011011 | 11/24/2019 | 1 | 11/24/2019 | Books |