MARC details
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
120627s2010 maua b 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2010014456 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781597495332 |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(Sirsi) u8297 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
EG-CaNU |
| Transcribing agency |
EG-CaNU |
| Modifying agency |
EG-CaNU |
| 042 ## - AUTHENTICATION CODE |
| Authentication code |
ncode |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Edition number |
22 |
| 245 00 - TITLE STATEMENT |
| Title |
Managing information security / |
| Statement of responsibility, etc. |
editor John R. Vacca. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. |
| Place of publication, distribution, etc. |
Burlington, MA : |
| Name of publisher, distributor, etc. |
Elsevier, |
| Date of publication, distribution, etc. |
2010. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xxiv, 296 p. : |
| Other physical details |
ill. ; |
| Dimensions |
24 cm. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc. note |
Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Information security essentials for IT managers: protecting mission-critical systems / Albert Caballero -- Security management systems / Joe Wright and James Harmening -- Information technology security management / Rahul Bhasker, Bhushan Kapoor -- Identity management / Jean-Marc Seigneur, Tewfiq El Maliki -- Intrusion prevention and detection systems / Christopher Day -- Computer forensics / Scott R. Ellis -- Network forensics / Yong Guan, Linfeng Zhang -- Firewalls / Errin W. Fulp -- Penetration testing / Jay Bavisi -- What is vulnerability assessment? / Almantas Kakareka. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long term challenges in the authors’ respective areas of expertise. |
| 596 ## - |
| -- |
1 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer security |
| General subdivision |
Management. |
| 9 (RLIN) |
15241 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer networks |
| General subdivision |
Security measures. |
| 9 (RLIN) |
15242 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Penetration testing (Computer security) |
| 9 (RLIN) |
15243 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Vacca, John R. |
| 9 (RLIN) |
15244 |