MARC details
000 -LEADER |
fixed length control field |
03090cam a22003255a 4500 |
001 - CONTROL NUMBER |
control field |
18288822 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20160530104728.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
140903t2015 nyua frbd 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780071821650 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0071821651 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
Modifying agency |
DLC |
-- |
EG-ScBUE |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Edition number |
22 |
Classification number |
658.478 |
Item number |
SCH |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Schou, Corey. |
9 (RLIN) |
40090 |
245 10 - TITLE STATEMENT |
Title |
Information assurance handbook : |
Remainder of title |
effective computer security and risk management strategies / |
Statement of responsibility, etc |
Corey Schou, Steven Hernandez. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
New York : |
Name of publisher, distributor, etc |
McGraw Hill Education, |
Date of publication, distribution, etc |
c.2015. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxix, 450 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm. |
500 ## - GENERAL NOTE |
General note |
Glossary : p. 427-436. |
500 ## - GENERAL NOTE |
General note |
Index : p. 437-450. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Bibliography : p. 405-419. |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Machine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices. |
520 ## - SUMMARY, ETC. |
Summary, etc |
"Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to integrate information assurance into your enterprise planning and IT strategy and offers an organizational approach to identifying, implementing, and controlling information assurance initiatives for small business and global enterprises alike"-- |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures |
Form subdivision |
Handbooks, manuals, etc. |
Source of heading or term |
BUEsh |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security |
Form subdivision |
Handbooks, manuals, etc. |
Source of heading or term |
BUEsh |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data protection |
Form subdivision |
Handbooks, manuals, etc. |
Source of heading or term |
BUEsh |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Information storage and retrieval systems |
General subdivision |
Security measures |
Form subdivision |
Handbooks, manuals, etc. |
Source of heading or term |
BUEsh |
651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME |
Source of heading or term |
BUEsh |
653 ## - INDEX TERM--UNCONTROLLED |
Resource For college |
Informatics and Computer Science |
Arrived date list |
May2016 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Hernandez, Steven. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
952 ## - LOCATION AND ITEM INFORMATION (KOHA) |
-- |
2016-05-30 |