35986841_10216840653711318_1105697261150535680_n

Information assurance handbook : (Record no. 4910)

MARC details
000 -LEADER
fixed length control field 03518cam a2200421 i 4500
001 - CONTROL NUMBER
control field 18288822
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20180429131551.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140903t20152015nyua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2014031481
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780071821650 (paperback)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0071821651 (paperback)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Description conventions rda
Modifying agency DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .S365 2015
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.74
Edition number 23
084 ## - OTHER CLASSIFICATION NUMBER
Classification number COM053000
Source of number bisacsh
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Schou, Corey.
245 10 - TITLE STATEMENT
Title Information assurance handbook :
Remainder of title effective computer security and risk management strategies /
Statement of responsibility, etc Corey Schou, Steven Hernandez.
250 ## - EDITION STATEMENT
Edition statement 1st ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New York :
Name of publisher, distributor, etc McGraw-Hill Education,
Date of publication, distribution, etc 2015.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE STATEMENTS
Place of production, publication, distribution, manufacture New York :
Name of producer, publisher, distributor, manufacturer McGraw-Hill Education,
Date of production, publication, distribution, manufacture [2015]
300 ## - PHYSICAL DESCRIPTION
Extent xxix, 450 pages :
Other physical details illustrations ;
Dimensions 24 cm
336 ## - CONTENT TYPE
Content Type Term text
Source rdacontent
337 ## - MEDIA TYPE
Media Type Term unmediated
Source rdamedia
338 ## - CARRIER TYPE
Carrier Type Term volume
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Machine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices.
520 ## - SUMMARY, ETC.
Summary, etc "Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to integrate information assurance into your enterprise planning and IT strategy and offers an organizational approach to identifying, implementing, and controlling information assurance initiatives for small business and global enterprises alike"--
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures
Form subdivision Handbooks, manuals, etc.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
Form subdivision Handbooks, manuals, etc.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection
Form subdivision Handbooks, manuals, etc.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information storage and retrieval systems
General subdivision Security measures
Form subdivision Handbooks, manuals, etc.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS / Security / General.
Source of heading or term bisacsh
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Hernandez, Steven.
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Centeral Library Centeral Library Second Floor - Computer Sciences 16.11.2016   005.74 S.C.I 2015 23993 16.11.2016 16.11.2016 Books