Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--

Computer security within organizations / (Record no. 277)

MARC details
000 -LEADER
fixed length control field 01591nam a2200325 a 4500
001 - CONTROL NUMBER
control field 2060872
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210317144416.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 940202s1993 enka b 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0333577272
040 ## - CATALOGING SOURCE
Original cataloging agency UGA
Transcribing agency UGA
Modifying agency Uk
-- NN
-- IDeKN
-- PPiU
-- DLC
Language of cataloging EG-NcFUE
Description conventions rda
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 658.478
Edition number 20
Item number W.A.C A8
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Warman, Adrian R.
9 (RLIN) 1170
Relator term author
245 10 - TITLE STATEMENT
Title Computer security within organizations /
Statement of responsibility, etc Adrian R. Warman.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Basingstoke, Hampshire :
Name of publisher, distributor, etc Macmillan,
Date of publication, distribution, etc 1993.
300 ## - PHYSICAL DESCRIPTION
Extent viii, 151 pages :
Other physical details illustrations ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
440 #0 - SERIES STATEMENT/ADDED ENTRY--TITLE
Title Macmillan information systems series
9 (RLIN) 1171
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references (p. 144-146) and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Preface - Basic Concepts - The Technology Trap - Systems Development - Management Considerations - Spreading the Message - Legislation - Where Next for Computer Security? - Bibliography - Index
520 ## - SUMMARY, ETC.
Summary, etc From basic concepts to the problems which technology itself can bring, and the complexities of legislation and standards development, this book guides the reader through a discussion of computer security issues from organizational and management perspectives.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
653 0# - INDEX TERM--UNCONTROLLED
Uncontrolled term Computers
-- Security
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c copycat
d 2
e ncip
f 19
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
  Dewey Decimal Classification     Commerce and business administration ( Management Information Systems ) Main library Main library B7 18/07/2010   658.478 W.A.C 00004722 19/02/2025 18/07/2010 Books