Introduction to information security : (Record no. 9466)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01695cam a2200313 i 4500 |
001 - CONTROL NUMBER | |
control field | 17939871 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OSt |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220527085226.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 131113s2014 ne a b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
LC control number | 2013044944 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781597499699 (pbk.) |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | DLC |
Language of cataloging | eng |
Transcribing agency | DLC |
Description conventions | rda |
Modifying agency | DLC |
042 ## - AUTHENTICATION CODE | |
Authentication code | pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK5102.85 |
Item number | .S53 2014 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Shimeall, Timothy, |
Relator term | author. |
245 10 - TITLE STATEMENT | |
Title | Introduction to information security : |
Remainder of title | a strategic-based approach / |
Statement of responsibility, etc. | Timothy J. Shimeall, Jonathan M. Spring. |
250 ## - EDITION STATEMENT | |
Edition statement | First edition. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxi, 360 pages : |
Other physical details | illustrations ; |
Dimensions | 24 cm |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | "The purpose of this book is primarily to develop a strategic method of thinking about information security. Chapters 1 and 2 motivate the strategic approach and define security-related terms. Chapters 3-15 are organized around a certain type of contribution to a strategic area. The four strategic stages developed are deception, frustration, resistance, and recognition/recovery. The chapter topics are summarized in Table I.1. As each strategy builds on the prior strategies, the most natural way for a reader interested in strategy to proceed is sequentially, perhaps skimming over some of the technical details"-- |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Telecommunication |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Spring, Jonathan M., |
Relator term | author. |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) | |
a | 7 |
b | cbc |
c | orignew |
d | 1 |
e | ecip |
f | 20 |
g | y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Not For Loan | Non-fiction | Tan Tao University | Tan Tao University | General Stacks | 06/08/2018 | Gift of the Asia Foundation | 005.8 | AS-2018-0007 | 06/08/2018 | 06/08/2018 | Books |