MARC details
000 -LEADER |
fixed length control field |
03117cam a2200397 i 4500 |
001 - CONTROL NUMBER |
control field |
19237550 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20220207082435.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
160819s2018 maua b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2016038356 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781284116458 |
Qualifying information |
paperback |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
Description conventions |
rda |
Modifying agency |
EG-CaTKH |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
Item number |
K536 2018 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 KI.F 2018 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Kim, David, |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Fundamentals of information systems security / |
Statement of responsibility, etc. |
David Kim, Michael G. Solomon. |
250 ## - EDITION STATEMENT |
Edition statement |
Third edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Burlington, MA : |
Name of producer, publisher, distributor, manufacturer |
Jones & Bartlett Learning, |
Date of production, publication, distribution, manufacture, or copyright notice |
2018. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxii, 548 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm. |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Media type code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Carrier type code |
nc |
Source |
rdacarrier |
490 1# - SERIES STATEMENT |
Series statement |
ISSA, Information systems security & assurance series |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references (pages 522-526) and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Preface -- Acknowledgements -- The authors -- Part I. The Need for Information Security : -- 1. Information Systems Security -- 2. The Internet of Things is Changing How We Live -- 3.Malicious Attacks, Threats, and Vulnerabilities -- 4. The Drivers of the Information Security Business -- Part II. Securing Today's Information Systems : -- 5.Access controls -- 6.Security Operations and Administration -- 7. Auditing, Testing, and Monitoring -- 8. Risk, Response, and Recovery -- 9.Cryptography --10.Networks and Telecommunications -- 11. Malicious Code and Activity -- Part III.Information Security Standards, Education, Certifications, and Laws : --12.Information Security Standards -- 13.Information Systems Security Education and Training -- 14. Information Security Professional Certifications -- 15.U.S. Compliance Laws -- Appendix A. Answer key -- Appendix B. Standard acronyms -- Appendix C. Earning the CompTIA security + certification -- Glossary of key terms -- References -- Index. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transition to a digital world. Part 2 presents a high level overview of the Security+ Exam and provides students with information as they move toward this certification. The book closes with information on information security standards, education, professional certifications, and compliance laws."--Publisher's website. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Information resources |
General subdivision |
Security measures. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Solomon, Michael, |
Dates associated with a name |
1963- |
Relator term |
author. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Jones & Bartlett Learning information systems security & assurance series. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Books |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Cataloger's name |
huda.mahmoud |
Cataloging process |
M |
First Date, FD (RLIN) |
2022026 |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Cataloger's name |
mona.romia |
Cataloging process |
R |
First Date, FD (RLIN) |
20220207 |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
orignew |
d |
1 |
e |
ecip |
f |
20 |
g |
y-gencatlg |