Information Security handbook 6th ed. Vol.4 (Record no. 3400)

MARC details
000 -LEADER
fixed length control field 02114nam a2200241Ia 4500
003 - CONTROL NUMBER IDENTIFIER
control field RRU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20231016170924.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210901b ||||||||| ||||||| 0|eng|d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781439819029
Printed Price Rs.7530.92
040 ## - CATALOGING SOURCE
Original cataloging agency RRU
Language of cataloging English
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title Eng.
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Class No. 005.8
Item number TIP
100 ## - FIRST AUTHOR (IF A PERSON)
9 (RLIN) 7106
Name of author Tipton, Harold F.
245 #0 - TITLE STATEMENT
Title Information Security handbook 6th ed. Vol.4
Statement of responsibility Tipon, Harold F.; Krause, Micki
250 ## - EDITION STATEMENT
Edition statement 6th Ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. CRC Press
Name of publisher, distributor, etc. London & New York
Date of publication, distribution, etc. 2012
300 ## - PHYSICAL DESCRIPTION
No. of pages 517p.
Other physical details 17.53 x 3.3 x 25.4 cm
520 ## - SUMMARY, ETC.
Summary, etc. Every year, in response to advancements in technology and new laws in different countries and regions, there are many changes and updates to the body of knowledge required of IT security professionals. Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security and assurance.<br/><br/>Providing an up-to-date compilation of the fundamental skills, techniques, tools, and understanding required of IT security professionals, the Information Security Management Handbook, Sixth Edition, Volume 4 reflects the latest changes to information security and the CISSP® Common Body of Knowledge (CBK®). This edition updates the benchmark Volume 1 with a wealth of new information on mobile device security, adaptive threat defense, Web 2.0, virtualization, data leakage, and governance. New material also addresses risk management, business continuity planning, disaster recovery planning, and cryptography.<br/><br/>As the risks that threaten the security of our systems continue to evolve, it is imperative that those charged with protecting that information stay ahead of the curve. Also available in a fully searchable CD-ROM format, this comprehensive resource provides the up-to-date understanding required to keep you abreast of the latest developments, new vulnerabilities, and possible threats.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Subject heading Technology
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Subject heading Data protection
9 (RLIN) 1704
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Subject heading Computer security--Management
9 (RLIN) 1863
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Reference
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Materials specified (bound volume or other part) Damaged status Not for loan (e.g. reference copy) Home library Current library Date acquired Inventory number Total Checkouts Full call number Accession No Date last seen Item MRP (printed price) Price effective from Koha item type
    Dewey Decimal Classification Vol.- 4     Rashtriya Raksha University Rashtriya Raksha University 30/09/2014 05372   005.8 TIP 5372 02/09/2021 7530.92 02/09/2021 Reference
© 2024 Rashtriya Raksha University, All Rights Reserved.