Introduction to information security : (Record no. 9466)

MARC details
000 -LEADER
fixed length control field 01695cam a2200313 i 4500
001 - CONTROL NUMBER
control field 17939871
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220527085226.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 131113s2014 ne a b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2013044944
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781597499699 (pbk.)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Description conventions rda
Modifying agency DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5102.85
Item number .S53 2014
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Shimeall, Timothy,
Relator term author.
245 10 - TITLE STATEMENT
Title Introduction to information security :
Remainder of title a strategic-based approach /
Statement of responsibility, etc. Timothy J. Shimeall, Jonathan M. Spring.
250 ## - EDITION STATEMENT
Edition statement First edition.
300 ## - PHYSICAL DESCRIPTION
Extent xxi, 360 pages :
Other physical details illustrations ;
Dimensions 24 cm
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc. "The purpose of this book is primarily to develop a strategic method of thinking about information security. Chapters 1 and 2 motivate the strategic approach and define security-related terms. Chapters 3-15 are organized around a certain type of contribution to a strategic area. The four strategic stages developed are deception, frustration, resistance, and recognition/recovery. The chapter topics are summarized in Table I.1. As each strategy builds on the prior strategies, the most natural way for a reader interested in strategy to proceed is sequentially, perhaps skimming over some of the technical details"--
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Telecommunication
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Spring, Jonathan M.,
Relator term author.
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification   Not For Loan Non-fiction Tan Tao University Tan Tao University General Stacks 06/08/2018 Gift of the Asia Foundation   005.8 AS-2018-0007 06/08/2018 06/08/2018 Books

Powered by Koha