MARC details
000 -LEADER |
fixed length control field |
01936cam a2200325 a 4500 |
001 - CONTROL NUMBER |
control field |
18082271 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20201128021246.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
140326t2014 ne a frb 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780128007440 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
Modifying agency |
DLC |
-- |
EG-ScBUE |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
AND |
Edition number |
22 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Andress, Jason. |
9 (RLIN) |
38011 |
245 14 - TITLE STATEMENT |
Title |
The basics of information security : |
Remainder of title |
understanding the fundamentals of InfoSec in theory and practice / |
Statement of responsibility, etc |
Jason Andress ; technical editor Steven Winterfeld. |
250 ## - EDITION STATEMENT |
Edition statement |
2nd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Waltham ; |
-- |
Oxford : |
Name of publisher, distributor, etc |
Syngress / Elsevier, |
Date of publication, distribution, etc |
c.2014. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxi, 217 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm. |
490 0# - Series Statement |
Series statement |
Syngress basics series |
490 0# - Series Statement |
Series statement |
The basics |
500 ## - GENERAL NOTE |
General note |
Index : p. 209-217. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references. |
520 ## - SUMMARY, ETC. |
Summary, etc |
"The Basics of Information Security will provide the reader with a basic knowledge of information security in both theoretical and practical aspects. We will first cover the basic knowledge needed to understand the key concepts of information security, discussing many of the concepts that underpin the security world. We will then dive into practical applications of these ideas in the areas of operations, physical, network, operating system, and application security. Book Audience This book will provide a valuable resource to beginning security professionals, as well as to network and systems administrators. The information provided on can be used develop a better understanding on how we protect our information assets and defend against attacks, as well as how to apply these concepts practically". |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
Source of heading or term |
BUEsh |
9 (RLIN) |
2637 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures. |
Source of heading or term |
BUEsh |
9 (RLIN) |
2634 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Information resources management. |
Source of heading or term |
BUEsh |
9 (RLIN) |
13875 |
651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME |
Source of heading or term |
BUEsh |
653 ## - INDEX TERM--UNCONTROLLED |
Resource For college |
Informatics and Computer Science |
Arrived date list |
May2015 |
655 ## - INDEX TERM--GENRE/FORM |
Form subdivision |
Reading book |
-- |
34232 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Winterfeld, Steven. |
9 (RLIN) |
38012 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Call number prefix |
005.8 AND |
952 ## - LOCATION AND ITEM INFORMATION (KOHA) |
-- |
2015-05-13 |