Welcome to UE Central Library

Keep Smiling

Information security : (Record no. 220)

MARC details
000 -LEADER
fixed length control field 01133cam a2200253 a 4500
001 - CONTROL NUMBER
control field 1486
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200629123839.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 071025s2008 ctu 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780313345586 (alk. paper)
040 ## - CATALOGING SOURCE
Transcribing agency DLC
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
Item number A374
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Alexander, Philip,
245 10 - TITLE STATEMENT
Title Information security :
Remainder of title a manager's guide to thwarting data thieves and hackers /
Statement of responsibility, etc Philip Alexander.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New Dehli :
Name of publisher, distributor, etc Pentagon Press,
Date of publication, distribution, etc 2008
300 ## - PHYSICAL DESCRIPTION
Extent viii, 175 p.
Dimensions 24 cm.
490 0# - SERIES STATEMENT
Series statement PSI business security
500 ## - GENERAL NOTE
General note Includes index.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Business enterprises
General subdivision Computer networks
-- Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information technology
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Computer use and data security policies and standards ; Network/DMZ design ; Defense in depth ; Authentication and authorization ; Security and the mobile employee ; Business continuity planning ; Hackers, snoops, and viruses ; Personnel issues and hiring practices ; Contractual considerations ; Data privacy laws ; Overseas outsourcing.
Holdings
Withdrawn status Damaged status Not for loan Home library Current library Date acquired Source of acquisition Full call number Barcode Date last seen Price effective from Koha item type
      UE-Central Library UE-Central Library 25.05.2018 U.E. 005.8 A374 T1486 25.05.2018 25.05.2018 Books
Copyright © 2023, University of Education, Lahore. All Rights Reserved.
Email:centrallibrary@ue.edu.pk