Information security policies, procedures, and standards : (Record no. 15881)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01033cam a22002174a 4500 |
001 - CONTROL NUMBER | |
control field | 12452395 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200903113437.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 010626s2002 flua b 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0849311373 (pbk. : alk. paper) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780849311376 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | DLC |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 21 |
Item number | P3932 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Peltier, Thomas R. |
245 10 - TITLE STATEMENT | |
Title | Information security policies, procedures, and standards : |
Remainder of title | guidelines for effective information security management |
Statement of responsibility, etc | / Thomas R. Peltier |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | Boca Raton : |
Name of publisher, distributor, etc | Auerbach Publications, |
Date of publication, distribution, etc | 2002 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xiv, 297 p. : |
Other physical details | ill. ; |
Dimensions | 26 cm. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data protection. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Books |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 1. Information protection fundamentals<br/>2. Writing mechanics and the message<br/>3. Policy development<br/>4. Mission statement<br/>5. Standards<br/>6. Writing procedures<br/>7. Information classification<br/>8. Security awareness program<br/>9. Why manage this process as a project?<br/>10. Information technology: code of practice for information security management<br/> |
Withdrawn status | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|
UE-Central Library | UE-Central Library | 15.11.2018 | U.E.25033 | 005.8 P3932 | T9768 | 15.11.2018 | 15.11.2018 | Books |