The basics of information security : (Record no. 19338)

MARC details
000 -LEADER
fixed length control field 01936cam a2200325 a 4500
001 - CONTROL NUMBER
control field 18082271
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20201128021246.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140326t2014 ne a frb 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780128007440
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Modifying agency DLC
-- EG-ScBUE
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number AND
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Andress, Jason.
9 (RLIN) 38011
245 14 - TITLE STATEMENT
Title The basics of information security :
Remainder of title understanding the fundamentals of InfoSec in theory and practice /
Statement of responsibility, etc Jason Andress ; technical editor Steven Winterfeld.
250 ## - EDITION STATEMENT
Edition statement 2nd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Waltham ;
-- Oxford :
Name of publisher, distributor, etc Syngress / Elsevier,
Date of publication, distribution, etc c.2014.
300 ## - PHYSICAL DESCRIPTION
Extent xxi, 217 p. :
Other physical details ill. ;
Dimensions 24 cm.
490 0# - Series Statement
Series statement Syngress basics series
490 0# - Series Statement
Series statement The basics
500 ## - GENERAL NOTE
General note Index : p. 209-217.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references.
520 ## - SUMMARY, ETC.
Summary, etc "The Basics of Information Security will provide the reader with a basic knowledge of information security in both theoretical and practical aspects. We will first cover the basic knowledge needed to understand the key concepts of information security, discussing many of the concepts that underpin the security world. We will then dive into practical applications of these ideas in the areas of operations, physical, network, operating system, and application security. Book Audience This book will provide a valuable resource to beginning security professionals, as well as to network and systems administrators. The information provided on can be used develop a better understanding on how we protect our information assets and defend against attacks, as well as how to apply these concepts practically".
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
Source of heading or term BUEsh
9 (RLIN) 2637
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
Source of heading or term BUEsh
9 (RLIN) 2634
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information resources management.
Source of heading or term BUEsh
9 (RLIN) 13875
651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME
Source of heading or term BUEsh
653 ## - INDEX TERM--UNCONTROLLED
Resource For college Informatics and Computer Science
Arrived date list May2015
655 ## - INDEX TERM--GENRE/FORM
Form subdivision Reading book
-- 34232
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Winterfeld, Steven.
9 (RLIN) 38012
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Call number prefix 005.8 AND
952 ## - LOCATION AND ITEM INFORMATION (KOHA)
-- 2015-05-13
Holdings
Withdrawn status Item status Source of classification or shelving scheme Damaged status Not for loan Vendor Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Serial Enumeration / chronology Total Checkouts Full call number Barcode Date last seen Cost, replacement price Koha item type
    Dewey Decimal Classification     Alahram Central Library Central Library Lower Floor 13/05/2015 Purchase 253.00 331   005.8 AND 000038193 12/02/2024 316.25 Book - Borrowing