Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--

Security 2020 : (Record no. 7016)

MARC details
000 -LEADER
fixed length control field 01933cam a2200373 a 4500
001 - CONTROL NUMBER
control field 587130786
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210427095256.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100713s2011 inua 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2010932423
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780470639559 (pbk : alk. paper)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0470639555 (pbk : alk. paper)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency UKM
-- BTCTA
-- YDXCP
-- VP@
-- SINLB
-- BWX
-- DAY
-- VRC
-- CDX
-- UKMGB
-- BDX
-- CLT
Description conventions rda
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number H6976 2011
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number H.D.S
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Howard, Doug.
245 10 - TITLE STATEMENT
Title Security 2020 :
Remainder of title reduce security risks this decade /
Statement of responsibility, etc Doug Howard and Kevin Prince ; [foreword by security ex.
250 ## - EDITION STATEMENT
Edition statement First Edition.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Indianapolis, IN :
Name of publisher, distributor, etc Wiley Pub.,
Date of publication, distribution, etc c2011.
300 ## - PHYSICAL DESCRIPTION
Extent xxvi, 305 pages. :
Other physical details illustrations ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
500 ## - GENERAL NOTE
General note Includes index.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1 What Has History Shown Us? - Chapter 2 External Infl uences on Security - Chapter 3 Technology Infl uences on Security - Chapter 4 Where Security Threats Will Come from in the Future - Chapter 5 Secure Communications and Collaboration - Chapter 6 2020 Revolution or Evolution? - Chapter 7 Security as a Business Now and Then - Chapter 8 Impact of the Economy over the Next 10 Years - Chapter 9 Eleven (Maybe Not So Crazy) Scenarios That Could - Chapter 10 Conclusion - Appendix Contributing Author Biographies 265<br/>
520 ## - SUMMARY, ETC.
Summary, etc Provides a history of computer security breaches, explores current and future threats, and offers information on how to combat security risks.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
General subdivision Forecasting.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Prince, Kevin.
856 ## - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract
Uniform Resource Identifier <a href="http://repository.fue.edu.eg/xmlui/handle/123456789/3465">http://repository.fue.edu.eg/xmlui/handle/123456789/3465</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
Source of classification or shelving scheme Dewey Decimal Classification
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Inventory number Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
  Dewey Decimal Classification     Computers & Information Technology ( Computer Science ) Main library Main library A2 18/12/2012 Academic bookshop 224.00 PU   005.8 H.D.S 00009390 19/02/2025 1 18/12/2012 Books