000 -LEADER |
fixed length control field |
01623cam a22003497a 4500 |
001 - CONTROL NUMBER |
control field |
15004560 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
APU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20150818165649.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
070912s2008 maua b 001 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2007530534 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781423901303 (pbk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
1423901304 (pbk.) |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)ocn123198622 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
AKC |
Transcribing agency |
AKC |
Modifying agency |
ANA |
Language of cataloging |
eng |
042 ## - AUTHENTICATION CODE |
Authentication code |
lccopycat |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5105.59 |
Item number |
.W45 2008 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
WHI 2008 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Whitman, Michael E., |
Dates associated with a name |
1964- |
9 (RLIN) |
11374 |
245 10 - TITLE STATEMENT |
Title |
Management of information security / |
Statement of responsibility, etc |
Michael E. Whitman, Herbert J. Mattord. |
250 ## - EDITION STATEMENT |
Edition statement |
2nd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Boston, Mass. : |
Name of publisher, distributor, etc |
Thomson Course Technology, |
Date of publication, distribution, etc |
c2008. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxiii, 576 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
505 2# - FORMATTED CONTENTS NOTE |
Formatted contents note |
ch. 1. Introduction to the management of information security -- ch. 2. Planning for security -- ch. 3. Planning for contingencies -- ch. 4. Information security policy -- ch. 5. Developing the security program -- ch. 6. Security management models and practices -- ch. 7. Risk management -- ch. 8. Risk management -- ch. 9. Protection mechanisms -- ch. 10. Personnel and security -- ch. 11. Law and ethics -- ch. 12. Information security project management. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures. |
9 (RLIN) |
77 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
9 (RLIN) |
76 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Management information systems |
General subdivision |
Security measures. |
9 (RLIN) |
22428 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Mattord, Herbert J. |
9 (RLIN) |
11375 |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
copycat |
d |
2 |
e |
ncip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
Book |
Koha issues (borrowed), all copies |
1 |