MARC details
000 -LEADER |
fixed length control field |
03265cam a22002777i 4500 |
001 - CONTROL NUMBER |
control field |
18653937 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20191217144357.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
150611t20142014maua b 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781284031621 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
1284031624 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781284031621 (pbk) |
040 ## - CATALOGING SOURCE |
Transcribing agency |
WAU |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
Item number |
K5601 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Kim, David |
245 10 - TITLE STATEMENT |
Title |
Fundamentals of information systems security / |
Statement of responsibility, etc |
David Kim and Michael G. Solomon. |
250 ## - EDITION STATEMENT |
Edition statement |
2nd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Burlington : |
Name of publisher, distributor, etc |
Jones & bartlett, |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxiv, 544 p. : |
Other physical details |
illustrations ; |
Dimensions |
24 cm. |
490 1# - SERIES STATEMENT |
Series statement |
Jones & Bartlett Learning information systems security & assurance series |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Information resources |
General subdivision |
Security measures. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Solomon, Michael |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Books |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Part one : The need for information security. Information systems security -- Changing how people and businesses communicate -- Malicious attacks, threats, and vulnerabilities -- The drivers of the information security business -- Part two : The Systems Security Certified Practitioner (SSCP) professional certification from (ISC)2. Access controls -- Security operations and administration -- Auditing, testing, and monitoring -- Risk, response, and recovery -- Cryptography -- Networks and telecommunications -- Malicious code and activity -- Part three : Information security standards, education, certifications, and laws. Information security standards -- Information systems security education and training -- Information security professional certifications -- U.S. compliance laws -- Appendixes. Answer key -- Standard acronyms -- Become a systems security certified practitioner (SSCP) -- Glossary of key terms -- References. |
520 ## - SUMMARY, ETC. |
Summary, etc |
Revised and updated with the latest information from this fast-paced field, Fundamentals of Information System Security, Second Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transformation to a digital world, including a look at how business, government, and individuals operate today. Part 2 is adapted from the Official (ISC)2 SSCP Certified Body of Knowledge and presents a high-level overview of each of the seven domains within the System Security Certified Practitioner certification. The book closes with a resource for readers who desire additional material on information security standards, education, professional certifications, and compliance laws. With its practical, conversational writing style and step-by-step examples, this text is a must-have resource for those entering the world of information systems security. New to the Second Edition: New material on cloud computing, risk analysis, IP mobility, OMNIBus, and Agile Software Development; Includes the most recent updates in Information Systems Security laws, certificates, standards, amendments, and the proposed Federal Information Security Amendments Act of 2013 and HITECH Act; Provides new cases and examples pulled from real-world scenarios; Updated data, tables, and sidebars provide the most current information in the field. - |