Data protection : (Record no. 15957)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01814cam a2200229 a 4500 |
001 - CONTROL NUMBER | |
control field | 15776522 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200908103118.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 090615s2009 flua 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781439806920 (hardcover : alk. paper) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1439806926 (hardcover : alk. paper) |
040 ## - CATALOGING SOURCE | |
Transcribing agency | DLC |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.86 |
Edition number | 22 |
Item number | H5501 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Hill, David G. |
245 10 - TITLE STATEMENT | |
Title | Data protection : |
Remainder of title | governance, risk management, and compliance |
Statement of responsibility, etc | / David G. Hill. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | Boca Raton, FL : |
Name of publisher, distributor, etc | Taylor & Francis, |
Date of publication, distribution, etc | 2009 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxv, 304 p. : |
Other physical details | ill. ; |
Dimensions | 25 cm. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data protection. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Information technology |
General subdivision | Security measures. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Books |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 1. The time has come for change<br/>2. Business continuity: the first foundation for data protection<br/>3. Data protection - where the problems lie<br/>4. Data protection - setting the right objectives<br/>5. Data protection - getting the right degree<br/>6. Information lifecycle management changes the data protection technology mix<br/>7. Compliance: a key piece of the grc puzzle<br/>8. Governance: the last piece in the grc puzzle<br/>9. The critical role of data retention<br/>10. Data security - an ongoing challenge<br/>11. Where data protection technologies fit in the new model<br/>12. Back to basics - extending the current model<br/>13. When supporting actors play lead roles<br/>14. Disk and tape - complementing and competing with one another<br/>15. Technologies for high availability and low (or no) data loss<br/>16. Special requirements for compliance, governance and data security<br/>17. Ediscovery and the electronic discovery reference model<br/>18. Cloud computing, saas and other data protection services<br/>19. Other considerations in data protection<br/>20. Typing it all together, including the pro-tech data protection model<br/> |
Withdrawn status | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|
UE-Central Library | UE-Central Library | 16.11.2018 | U.E.24316 | 005.86 H5501 | T9950 | 16.11.2018 | 16.11.2018 | Books |