Information security : (Record no. 220)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01133cam a2200253 a 4500 |
001 - CONTROL NUMBER | |
control field | 1486 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200629123839.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 071025s2008 ctu 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780313345586 (alk. paper) |
040 ## - CATALOGING SOURCE | |
Transcribing agency | DLC |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 22 |
Item number | A374 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Alexander, Philip, |
245 10 - TITLE STATEMENT | |
Title | Information security : |
Remainder of title | a manager's guide to thwarting data thieves and hackers / |
Statement of responsibility, etc | Philip Alexander. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | New Dehli : |
Name of publisher, distributor, etc | Pentagon Press, |
Date of publication, distribution, etc | 2008 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | viii, 175 p. |
Dimensions | 24 cm. |
490 0# - SERIES STATEMENT | |
Series statement | PSI business security |
500 ## - GENERAL NOTE | |
General note | Includes index. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Business enterprises |
General subdivision | Computer networks |
-- | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Information technology |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data protection. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Books |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Computer use and data security policies and standards ; Network/DMZ design ; Defense in depth ; Authentication and authorization ; Security and the mobile employee ; Business continuity planning ; Hackers, snoops, and viruses ; Personnel issues and hiring practices ; Contractual considerations ; Data privacy laws ; Overseas outsourcing. |
Withdrawn status | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|
UE-Central Library | UE-Central Library | 25.05.2018 | U.E. | 005.8 A374 | T1486 | 25.05.2018 | 25.05.2018 | Books |