Managing information security / (Record no. 7195)

MARC details
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 120627s2010 maua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2010014456
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781597495332
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) u8297
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaNU
Transcribing agency EG-CaNU
Modifying agency EG-CaNU
042 ## - AUTHENTICATION CODE
Authentication code ncode
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
245 00 - TITLE STATEMENT
Title Managing information security /
Statement of responsibility, etc. editor John R. Vacca.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Burlington, MA :
Name of publisher, distributor, etc. Elsevier,
Date of publication, distribution, etc. 2010.
300 ## - PHYSICAL DESCRIPTION
Extent xxiv, 296 p. :
Other physical details ill. ;
Dimensions 24 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Information security essentials for IT managers: protecting mission-critical systems / Albert Caballero -- Security management systems / Joe Wright and James Harmening -- Information technology security management / Rahul Bhasker, Bhushan Kapoor -- Identity management / Jean-Marc Seigneur, Tewfiq El Maliki -- Intrusion prevention and detection systems / Christopher Day -- Computer forensics / Scott R. Ellis -- Network forensics / Yong Guan, Linfeng Zhang -- Firewalls / Errin W. Fulp -- Penetration testing / Jay Bavisi -- What is vulnerability assessment? / Almantas Kakareka.
520 ## - SUMMARY, ETC.
Summary, etc. Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long term challenges in the authors’ respective areas of expertise.
596 ## -
-- 1
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
General subdivision Management.
9 (RLIN) 15241
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
9 (RLIN) 15242
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Penetration testing (Computer security)
9 (RLIN) 15243
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Vacca, John R.
9 (RLIN) 15244
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Total Renewals Full call number Barcode Date last seen Date last checked out Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main library Main library General Stacks 01/26/2020 PURCHASE 1 1 005.8 / VA.M 2010 011619 05/29/2023 05/11/2023 1 11/24/2019 Books