Information security (Record no. 192138)

MARC details
000 -LEADER
fixed length control field 01759nam a2200361 a 4500
001 - CONTROL NUMBER
control field ebr10481060
003 - CONTROL NUMBER IDENTIFIER
control field CaPaEBR
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m u
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 071025s2008 ctu s 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
Canceled/invalid LC control number 2007043997
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780313345586 (alk. paper)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780313345593 (e-book)
040 ## - CATALOGING SOURCE
Original cataloging agency CaPaEBR
Transcribing agency CaPaEBR
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)738439112
050 14 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HF5548.37
Item number .A44 2008eb
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Alexander, Philip,
Dates associated with a name 1963-
245 10 - TITLE STATEMENT
Title Information security
Medium [electronic resource] :
Remainder of title a manager's guide to thwarting data thieves and hackers /
Statement of responsibility, etc. Philip Alexander.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Westport, Conn. :
Name of publisher, distributor, etc. Praeger Security International,
Date of publication, distribution, etc. 2008.
300 ## - PHYSICAL DESCRIPTION
Extent viii, 175 p.
490 1# - SERIES STATEMENT
Series statement PSI business security
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Computer use and data security policies and standards -- Network/DMZ design -- Defense in depth -- Authentication and authorization -- Security and the mobile employee -- Business continuity planning -- Hackers, snoops, and viruses -- Personnel issues and hiring practices -- Contractual considerations -- Data privacy laws -- Overseas outsourcing.
533 ## - REPRODUCTION NOTE
Type of reproduction Electronic reproduction.
Place of reproduction Palo Alto, Calif. :
Agency responsible for reproduction ebrary,
Date of reproduction 2013.
Note about reproduction Available via World Wide Web.
-- Access may be limited to ebrary affiliated libraries.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Business enterprises
General subdivision Computer networks
-- Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information technology
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection.
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
Source of term local
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element ebrary, Inc.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title PSI business security.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://site.ebrary.com/lib/daystar/Doc?id=10481060">http://site.ebrary.com/lib/daystar/Doc?id=10481060</a>
Public note An electronic book accessible through the World Wide Web; click to view

No items available.