Information assurance handbook : (Record no. 21821)

MARC details
000 -LEADER
fixed length control field 03090cam a22003255a 4500
001 - CONTROL NUMBER
control field 18288822
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20160530104728.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140903t2015 nyua frbd 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780071821650
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0071821651
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Modifying agency DLC
-- EG-ScBUE
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 22
Classification number 658.478
Item number SCH
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Schou, Corey.
9 (RLIN) 40090
245 10 - TITLE STATEMENT
Title Information assurance handbook :
Remainder of title effective computer security and risk management strategies /
Statement of responsibility, etc Corey Schou, Steven Hernandez.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New York :
Name of publisher, distributor, etc McGraw Hill Education,
Date of publication, distribution, etc c.2015.
300 ## - PHYSICAL DESCRIPTION
Extent xxix, 450 p. :
Other physical details ill. ;
Dimensions 24 cm.
500 ## - GENERAL NOTE
General note Glossary : p. 427-436.
500 ## - GENERAL NOTE
General note Index : p. 437-450.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Bibliography : p. 405-419.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Machine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices.
520 ## - SUMMARY, ETC.
Summary, etc "Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to integrate information assurance into your enterprise planning and IT strategy and offers an organizational approach to identifying, implementing, and controlling information assurance initiatives for small business and global enterprises alike"--
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures
Form subdivision Handbooks, manuals, etc.
Source of heading or term BUEsh
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
Form subdivision Handbooks, manuals, etc.
Source of heading or term BUEsh
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection
Form subdivision Handbooks, manuals, etc.
Source of heading or term BUEsh
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information storage and retrieval systems
General subdivision Security measures
Form subdivision Handbooks, manuals, etc.
Source of heading or term BUEsh
651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME
Source of heading or term BUEsh
653 ## - INDEX TERM--UNCONTROLLED
Resource For college Informatics and Computer Science
Arrived date list May2016
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Hernandez, Steven.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
952 ## - LOCATION AND ITEM INFORMATION (KOHA)
-- 2016-05-30
Holdings
Withdrawn status Item status Source of classification or shelving scheme Damaged status Not for loan Vendor Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Cost, replacement price Koha item type
    Dewey Decimal Classification     Alahram Central Library Central Library First floor 30/05/2016 Purchase 510.00   658.478 SCH 000032603 12/02/2024 637.50 Book - Borrowing