MARC details
| 000 -LEADER |
| fixed length control field |
03093cam a2200397 i 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20200203151123.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
180412t20192019njua b 001 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9780134772806 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
0134772806 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
TOH |
| Language of cataloging |
eng |
| Transcribing agency |
TOH |
| Description conventions |
rda |
| Modifying agency |
YDX |
| -- |
OCLCO |
| -- |
OCLCF |
| -- |
IUL |
| -- |
UPM |
| -- |
AU@ |
| -- |
AUMLT |
| -- |
UWO |
| -- |
FWA |
| -- |
DLC |
| 042 ## - AUTHENTICATION CODE |
| Authentication code |
lccopycat |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
QA76.9.A25 |
| Item number |
S686 2019 |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Edition number |
23 |
| Item number |
S.W.E |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Stallings, William |
| Relator term |
author. |
| 9 (RLIN) |
562 |
| Dates associated with a name |
1945- |
| 245 10 - TITLE STATEMENT |
| Title |
Effective cybersecurity : |
| Remainder of title |
understanding and using standards and best practices / |
| Statement of responsibility, etc |
William Stallings. |
| 246 14 - VARYING FORM OF TITLE |
| Title proper/short title |
Effective cybersecurity: a guide to using best practices and standards |
| 264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc |
Upper Saddle River, NJ : |
| Name of publisher, distributor, etc |
Addison-Wesley, |
| Date of publication, distribution, etc |
[2019] |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xxxi, 768 pages : |
| Other physical details |
illustrations ; |
| Dimensions |
24 cm |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Content type code |
txt |
| Source |
rdacontent |
| 337 ## - MEDIA TYPE |
| Media type term |
unmediated |
| Media type code |
n |
| Source |
rdamedia |
| 338 ## - CARRIER TYPE |
| Carrier type term |
volume |
| Carrier type code |
nc |
| Source |
rdacarrier |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc |
Includes bibliographical references (pages 694-707) and index. |
| 505 #0 - FORMATTED CONTENTS NOTE |
| Formatted contents note |
1. Guides to Practical Cybersecurity2. Security Governance3. Information Risk Assessment4. Security Management5. People Management6. Information Management7. Physical Asset Management8. System Development9. Business Applications Management10. System Access11. System Management12. Networks and Communications13. Supply Chain Management14. Technical Security Management15. Threat and Incident Management16. Local Environment Management Part Three: Security Monitoring and Improvement17. Business Continuity18. Security Monitoring and Improvement |
| 520 ## - SUMMARY, ETC. |
| Summary, etc |
"In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management practices needed for successful cybersecurity. Stallings makes extensive use of standards and best practices documents that are often used to guide or mandate cybersecurity implementation. Going beyond these, he offers in-depth tutorials on the 'how' of implementation, integrated into a unified framework and realistic plan of action. Effective Cybersecurity aligns with the comprehensive Information Security Forum document 'The Standard of Good Practice for Information Security,' extending ISF's work with extensive insights from ISO, NIST, COBIT, other official standards and guidelines, and modern professional, academic, and industry literature. This knowledge is indispensable to every cybersecurity professional. Stallings presents it systematically and coherently, making it practical and actionable"--Back cover. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security |
| General subdivision |
Standards. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Information technology |
| General subdivision |
Management |
| -- |
Security measures. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer networks |
| General subdivision |
Security measures. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Internet |
| General subdivision |
Security measures. |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
COMPUTERS / Security / General. |
| Source of heading or term |
bisacsh |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer networks |
| General subdivision |
Security measures. |
| Source of heading or term |
fast |
| Authority record control number |
(OCoLC)fst00872341 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security. |
| Source of heading or term |
fast |
| Authority record control number |
(OCoLC)fst00872484 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security |
| General subdivision |
Standards. |
| Source of heading or term |
fast |
| Authority record control number |
(OCoLC)fst00872495 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Internet |
| General subdivision |
Security measures. |
| Source of heading or term |
fast |
| Authority record control number |
(OCoLC)fst01751426 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Dewey Decimal Classification |
| Koha item type |
Books |