Information assurance handbook : (Record no. 2296)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03477cam a2200409 i 4500 |
001 - CONTROL NUMBER | |
control field | 18288822 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | KWUST |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20230708103200.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 140903t20152015nyua b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
LC control number | 2014031481 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9789339222376 (paperback) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0071821651 (paperback) |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | DLC |
Language of cataloging | eng |
Transcribing agency | DLC |
Description conventions | rda |
Modifying agency | DLC |
042 ## - AUTHENTICATION CODE | |
Authentication code | pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK5105.59.S36 2019 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 658.4/78 |
Edition number | 23 |
084 ## - OTHER CLASSIFICATION NUMBER | |
Classification number | COM053000 |
Number source | bisacsh |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Schou, Corey. |
245 10 - TITLE STATEMENT | |
Title | Information assurance handbook : |
Remainder of title | effective computer security and risk management strategies / |
Statement of responsibility, etc. | Corey Schou, Steven Hernandez. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | New York : |
Name of producer, publisher, distributor, manufacturer | McGraw-Hill Education, |
Date of production, publication, distribution, manufacture, or copyright notice | [2019] |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxix, 450 pages : |
Other physical details | illustrations ; |
Dimensions | 24 cm |
336 ## - CONTENT TYPE | |
Content type term | text |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | unmediated |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | volume |
Source | rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes bibliographical references and index. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Machine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | "Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to integrate information assurance into your enterprise planning and IT strategy and offers an organizational approach to identifying, implementing, and controlling information assurance initiatives for small business and global enterprises alike"-- |
Assigning source | Provided by publisher. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks |
General subdivision | Security measures |
Form subdivision | Handbooks, manuals, etc. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security |
Form subdivision | Handbooks, manuals, etc. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data protection |
Form subdivision | Handbooks, manuals, etc. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Information storage and retrieval systems |
General subdivision | Security measures |
Form subdivision | Handbooks, manuals, etc. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS / Security / General. |
Source of heading or term | bisacsh |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Hernandez, Steven. |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) | |
a | 7 |
b | cbc |
c | orignew |
d | 1 |
e | ecip |
f | 20 |
g | y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Inventory number | Total Checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Library of Congress Classification | KWUST-Main Library | KWUST-Main Library | General Stacks | 07/06/2023 | 701/11-2022 | TK5105.59.S36 2019 | 2023-0409 | 07/08/2023 | C,1 | 07/06/2023 | Books | |||||
Library of Congress Classification | KWUST-Main Library | KWUST-Main Library | General Stacks | 07/06/2023 | 702/11-2022 | TK5105.59.S36 2019 | 2023-0410 | 07/06/2023 | C,2 | 07/06/2023 | Books | |||||
Library of Congress Classification | KWUST-Main Library | KWUST-Main Library | General Stacks | 07/06/2023 | 703/11-2022 | TK5105.59.S36 2019 | 2023-0411 | 07/06/2023 | C,3 | 07/06/2023 | Books |