Asia Pacific University Library catalogue


Management of information security / (Record no. 12057)

000 -LEADER
fixed length control field 01623cam a22003497a 4500
001 - CONTROL NUMBER
control field 15004560
003 - CONTROL NUMBER IDENTIFIER
control field APU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20150818165649.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 070912s2008 maua b 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2007530534
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781423901303 (pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1423901304 (pbk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn123198622
040 ## - CATALOGING SOURCE
Original cataloging agency AKC
Transcribing agency AKC
Modifying agency ANA
Language of cataloging eng
042 ## - AUTHENTICATION CODE
Authentication code lccopycat
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .W45 2008
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number WHI 2008
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Whitman, Michael E.,
Dates associated with a name 1964-
9 (RLIN) 11374
245 10 - TITLE STATEMENT
Title Management of information security /
Statement of responsibility, etc Michael E. Whitman, Herbert J. Mattord.
250 ## - EDITION STATEMENT
Edition statement 2nd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Boston, Mass. :
Name of publisher, distributor, etc Thomson Course Technology,
Date of publication, distribution, etc c2008.
300 ## - PHYSICAL DESCRIPTION
Extent xxiii, 576 p. :
Other physical details ill. ;
Dimensions 24 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 2# - FORMATTED CONTENTS NOTE
Formatted contents note ch. 1. Introduction to the management of information security -- ch. 2. Planning for security -- ch. 3. Planning for contingencies -- ch. 4. Information security policy -- ch. 5. Developing the security program -- ch. 6. Security management models and practices -- ch. 7. Risk management -- ch. 8. Risk management -- ch. 9. Protection mechanisms -- ch. 10. Personnel and security -- ch. 11. Law and ethics -- ch. 12. Information security project management.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
9 (RLIN) 77
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
9 (RLIN) 76
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Management information systems
General subdivision Security measures.
9 (RLIN) 22428
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Mattord, Herbert J.
9 (RLIN) 11375
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c copycat
d 2
e ncip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Book
Koha issues (borrowed), all copies 1
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Invoice number Cost, normal purchase price Total Checkouts Total Renewals Full call number Barcode Date last seen Date checked out Copy number Cost, replacement price Price effective from Koha item type
Not Withdrawn Available   Not Damaged Processing Book APU Library APU Library Open Shelf APIIT 25/03/2014 EMO A097258 300.00 1 2 TK5105.59 .W45 2008 c.1 00030989 08/10/2014 11/09/2014 1 300.00 25/03/2014 General Circulation