Information Security handbook 6th ed. Vol.5 (Record no. 3401)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01861nam a2200217Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | RRU |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20231016172532.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 210901b ||||||||| ||||||| 0|eng|d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781439853450 |
Printed Price | Rs.6777.72.00 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | RRU |
Language of cataloging | English |
041 ## - LANGUAGE CODE | |
Language code of text/sound track or separate title | Eng. |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Class No. | 005.8 |
Item number | TIP |
100 ## - FIRST AUTHOR (IF A PERSON) | |
9 (RLIN) | 7106 |
Name of author | Tipton, Harold F. |
245 #0 - TITLE STATEMENT | |
Title | Information Security handbook 6th ed. Vol.5 |
Statement of responsibility | Tipon, Harold F.; Krause, Micki |
250 ## - EDITION STATEMENT | |
Edition statement | 6th Ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | CRC Press |
Name of publisher, distributor, etc. | London & New York |
Date of publication, distribution, etc. | 2012 |
300 ## - PHYSICAL DESCRIPTION | |
No. of pages | 544p. |
Other physical details | 17.78 x 3.56 x 25.65 cm |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security (IS) and assurance. Facilitating the up-to-date understanding required of all IS professionals, the Information Security Management Handbook, Sixth Edition, Volume 5 reflects the latest issues in information security and the CISSP® Common Body of Knowledge (CBK®).<br/><br/>This edition updates the benchmark Volume 1 with a wealth of new information to help IS professionals address the challenges created by complex technologies and escalating threats to information security. Topics covered include chapters related to access control, physical security, cryptography, application security, operations security, and business continuity and disaster recovery planning.<br/><br/>The updated edition of this bestselling reference provides cutting-edge reporting on mobile device security, adaptive threat defense, Web 2.0, virtualization, data leakage, governance, and compliance. Also available in a fully searchable CD-ROM format, it supplies you with the tools and understanding to stay one step ahead of evolving threats and ever-changing standards and regulations. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Subject heading | Technology |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Reference |
Withdrawn status | Lost status | Source of classification or shelving scheme | Materials specified (bound volume or other part) | Damaged status | Not for loan (e.g. reference copy) | Home library | Current library | Date acquired | Inventory number | Total Checkouts | Full call number | Accession No | Date last seen | Item MRP (printed price) | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Vol. 5 | Rashtriya Raksha University | Rashtriya Raksha University | 30/09/2014 | 05373 | 005.8 TIP | 5373 | 02/09/2021 | 6777.72 | 02/09/2021 | Reference |