Information Security handbook 6th ed. Vol.7 (Record no. 3403)

MARC details
000 -LEADER
fixed length control field 02145nam a2200241Ia 4500
003 - CONTROL NUMBER IDENTIFIER
control field RRU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20231016165326.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210901b ||||||||| ||||||| 0|eng|d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781466567498
Printed Price Rs.6239.72
040 ## - CATALOGING SOURCE
Original cataloging agency RRU
Language of cataloging English
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title Eng.
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Class No. 005.8
Item number HAN
100 ## - FIRST AUTHOR (IF A PERSON)
9 (RLIN) 7107
Name of author O'Hanley, Richard
245 #0 - TITLE STATEMENT
Title Information Security handbook 6th ed. Vol.7
Statement of responsibility Tipon, Harold F.; Krause, Micki
250 ## - EDITION STATEMENT
Edition statement 6th Ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. CRC Press
Name of publisher, distributor, etc. London & New York
Date of publication, distribution, etc. 2012
300 ## - PHYSICAL DESCRIPTION
No. of pages 420p.
Other physical details ‎ 17.78 x 2.97 x 25.4 cm
520 ## - SUMMARY, ETC.
Summary, etc. Updated annually, the Information Security Management Handbook, Sixth Edition is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations.<br/><br/>Reporting on the latest developments in information security and recent changes to the (ISC)2® CISSP Common Body of Knowledge (CBK®), Volume 7 features 27 new chapters on topics such as BYOD, IT consumerization, smart grids, security, and privacy.<br/><br/>Covers the fundamental knowledge, skills, techniques, and tools required by IT security professionals<br/>Updates its bestselling predecessors with new developments in information security and the (ISC)2® CISSP® CBK®<br/>Provides valuable insights from leaders in the field on the theory and practice of computer security technology<br/>Facilitates the comprehensive and up-to-date understanding you need to stay fully informed<br/>The ubiquitous nature of computers and networks will always provide the opportunity and means to do harm. This edition updates its popular predecessors with the information you need to address the vulnerabilities created by recent innovations such as cloud computing, mobile banking, digital wallets, and near-field communications. This handbook is also available on CD.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Subject heading Technology
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Subject heading O'Hanley, Richard [Editor]
9 (RLIN) 7108
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Subject heading Tiller, James S. [Editor]
9 (RLIN) 7109
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Reference
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan (e.g. reference copy) Home library Current library Date acquired Inventory number Total Checkouts Full call number Accession No Date last seen Item MRP (printed price) Price effective from Koha item type
    Dewey Decimal Classification     Rashtriya Raksha University Rashtriya Raksha University 30/09/2014 05375   005.8 HAN 5375 02/09/2021 6239.72 02/09/2021 Reference
© 2024 Rashtriya Raksha University, All Rights Reserved.