Information security management handbook / (Record no. 6963)

MARC details
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 120301m20079999flua bf 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2006048504
Canceled/invalid LC control number 2009502211
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781420067088
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1420067087
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) u8064
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaNU
Transcribing agency EG-CaNU
Modifying agency EG-CaNU
042 ## - AUTHENTICATION CODE
Authentication code ncode
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
245 00 - TITLE STATEMENT
Title Information security management handbook /
Statement of responsibility, etc. Harold F. Tipton, Micki Krause, [editors].
250 ## - EDITION STATEMENT
Edition statement 6th ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boca Raton :
Name of publisher, distributor, etc. Auerbach Publications,
Date of publication, distribution, etc. c2007-
300 ## - PHYSICAL DESCRIPTION
Extent v. <2> :
Other physical details ill. ;
Dimensions 24-26 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Access Control Systems and Methodology -- Telecommunications and Network Security -- Security Management Practices -- Applications and Systems Development Security -- Cryptography -- Security Architecture and Models -- Operations Security -- Business Continuity Planning and Disaster Recovery Planning -- Law, Investigations, and Ethics.
520 ## - SUMMARY, ETC.
Summary, etc. A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Information Security, Volume 2 includes coverage of each domain of the Common Body of Knowledge, the standard of knowledge required by IT security professionals worldwide. In step with the lightening-quick, increasingly fast pace of change in the technology field, this book is updated annually, keeping IT professionals updated and current in their field and on the job.
596 ## -
-- 1
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
General subdivision Management
Form subdivision Handbooks, manuals, etc.
9 (RLIN) 14616
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection
Form subdivision Handbooks, manuals, etc.
9 (RLIN) 14617
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Tipton, Harold F.
9 (RLIN) 14618
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Nozaki, Micki Krause.
9 (RLIN) 14619
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main library Main library General Stacks 01/26/2020 PURCHASE   005.8 / TI.I 2007 011587 11/24/2019 1 11/24/2019 Books