Information assurance handbook : (Record no. 2296)

MARC details
000 -LEADER
fixed length control field 03477cam a2200409 i 4500
001 - CONTROL NUMBER
control field 18288822
003 - CONTROL NUMBER IDENTIFIER
control field KWUST
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230708103200.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140903t20152015nyua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2014031481
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789339222376 (paperback)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0071821651 (paperback)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Description conventions rda
Modifying agency DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59.S36 2019
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 658.4/78
Edition number 23
084 ## - OTHER CLASSIFICATION NUMBER
Classification number COM053000
Number source bisacsh
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Schou, Corey.
245 10 - TITLE STATEMENT
Title Information assurance handbook :
Remainder of title effective computer security and risk management strategies /
Statement of responsibility, etc. Corey Schou, Steven Hernandez.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture New York :
Name of producer, publisher, distributor, manufacturer McGraw-Hill Education,
Date of production, publication, distribution, manufacture, or copyright notice [2019]
300 ## - PHYSICAL DESCRIPTION
Extent xxix, 450 pages :
Other physical details illustrations ;
Dimensions 24 cm
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Machine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices.
520 ## - SUMMARY, ETC.
Summary, etc. "Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to integrate information assurance into your enterprise planning and IT strategy and offers an organizational approach to identifying, implementing, and controlling information assurance initiatives for small business and global enterprises alike"--
Assigning source Provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures
Form subdivision Handbooks, manuals, etc.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
Form subdivision Handbooks, manuals, etc.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection
Form subdivision Handbooks, manuals, etc.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information storage and retrieval systems
General subdivision Security measures
Form subdivision Handbooks, manuals, etc.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Security / General.
Source of heading or term bisacsh
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Hernandez, Steven.
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Inventory number Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Library of Congress Classification     KWUST-Main Library KWUST-Main Library General Stacks 07/06/2023 701/11-2022   TK5105.59.S36 2019 2023-0409 07/08/2023 C,1 07/06/2023 Books
    Library of Congress Classification     KWUST-Main Library KWUST-Main Library General Stacks 07/06/2023 702/11-2022   TK5105.59.S36 2019 2023-0410 07/06/2023 C,2 07/06/2023 Books
    Library of Congress Classification     KWUST-Main Library KWUST-Main Library General Stacks 07/06/2023 703/11-2022   TK5105.59.S36 2019 2023-0411 07/06/2023 C,3 07/06/2023 Books
Copyright: KWUST 2023
Kiriri Women's University of Science and Technology - Empowering Women Through Education
P.O. BOX 49274 – 00100 Nairobi, Kenya
Registrar and Admissions +254 (0) 789626819
Email info@kwust.ac.ke