MARC details
000 -LEADER |
fixed length control field |
02024nam a2200241Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250520094840.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250520s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
619216255 |
040 ## - CATALOGING SOURCE |
Transcribing agency |
NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK 5105.59 .W45 2005 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Whitman, Michael E. |
Relator term |
author |
245 #0 - TITLE STATEMENT |
Title |
Principles of information security / |
Statement of responsibility, etc. |
Michael E. Whitman and Herbert J. Mattord |
250 ## - EDITION STATEMENT |
Edition statement |
Second Edition. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Princeton, New Jersey : |
Name of publisher, distributor, etc. |
Recording for the Blind & Dyslexic, |
Date of publication, distribution, etc. |
c2005 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxiii, 576 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes index. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Introduction to information security -- Need for security -- Legal, ethical, and professional issues in information security -- Risk management -- Planning for security -- Security technology, firewalls and VPNs -- Security technology, intrusion detection, access control, and other security tools -- Cryptography -- Physical security -- Implementing information security -- Security and personnel -- Information security maintenance -- |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Utilizing a foundations approach, [this book] provides information systems students with a thorough examination of the field of information security to prepare them for their role as eventual business decision makers. With extensive opportunity for hands-on work, the authors discuss information security within a real-world context, by including examples of issues faced by today's professionals and tools such as "Offline" boxes with interesting stories in each chapter. This textbook presents a balance of the managerial and the technical aspects of the discipline and addresses knowledge areas of the CISSP (Certified Information Systems Security Professional) certification throughout. Other topics include legal and ethical issues in Information Security, Risk Management, Network and System Security, Cryptography, and the Information Security Maintenance. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
COMPUTER SECURITY |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Mattord, Herbert J. |
Relator term |
co-author |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Books |