MARC details
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
120301m20079999flua bf 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2006048504 |
| Canceled/invalid LC control number |
2009502211 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781420067088 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
1420067087 |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(Sirsi) u8064 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
EG-CaNU |
| Transcribing agency |
EG-CaNU |
| Modifying agency |
EG-CaNU |
| 042 ## - AUTHENTICATION CODE |
| Authentication code |
ncode |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Edition number |
22 |
| 245 00 - TITLE STATEMENT |
| Title |
Information security management handbook / |
| Statement of responsibility, etc. |
Harold F. Tipton, Micki Krause, [editors]. |
| 250 ## - EDITION STATEMENT |
| Edition statement |
6th ed. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. |
| Place of publication, distribution, etc. |
Boca Raton : |
| Name of publisher, distributor, etc. |
Auerbach Publications, |
| Date of publication, distribution, etc. |
c2007- |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
v. <2> : |
| Other physical details |
ill. ; |
| Dimensions |
24-26 cm. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc. note |
Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Access Control Systems and Methodology -- Telecommunications and Network Security -- Security Management Practices -- Applications and Systems Development Security -- Cryptography -- Security Architecture and Models -- Operations Security -- Business Continuity Planning and Disaster Recovery Planning -- Law, Investigations, and Ethics. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Information Security, Volume 2 includes coverage of each domain of the Common Body of Knowledge, the standard of knowledge required by IT security professionals worldwide. In step with the lightening-quick, increasingly fast pace of change in the technology field, this book is updated annually, keeping IT professionals updated and current in their field and on the job. |
| 596 ## - |
| -- |
1 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer security |
| General subdivision |
Management |
| Form subdivision |
Handbooks, manuals, etc. |
| 9 (RLIN) |
14616 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Data protection |
| Form subdivision |
Handbooks, manuals, etc. |
| 9 (RLIN) |
14617 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Tipton, Harold F. |
| 9 (RLIN) |
14618 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Nozaki, Micki Krause. |
| 9 (RLIN) |
14619 |