MARC details
| 000 -LEADER |
| fixed length control field |
03279cam a22004577i 4500 |
| 001 - CONTROL NUMBER |
| control field |
18250193 |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20210427122420.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
140801t20142014mau b 001 0 eng d |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2014412845 |
| 016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER |
| Record control number |
016471912 |
| Source |
Uk |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9780124166882 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
0124166881 (pbk.) |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(OCoLC)ocn866626513 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
REB |
| Language of cataloging |
eng |
| Description conventions |
rda |
| Transcribing agency |
REB |
| Modifying agency |
OCLCO |
| -- |
UKMGB |
| -- |
CAUOI |
| -- |
DLC |
| 042 ## - AUTHENTICATION CODE |
| Authentication code |
lccopycat |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
QA76.9.A25 |
| Item number |
M31845 2014 |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Edition number |
23 |
| Item number |
M |
| 245 00 - TITLE STATEMENT |
| Title |
Managing information security / |
| Statement of responsibility, etc |
edited by John R. Vacca. |
| 250 ## - EDITION STATEMENT |
| Edition statement |
Second edition. |
| 264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc |
Waltham, MA : |
| Name of publisher, distributor, etc |
Syngress, |
| Date of publication, distribution, etc |
[2014] |
| 264 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Date of publication, distribution, etc |
©2014 |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xxiv, 347 pages ; |
| Dimensions |
24 cm |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Content type code |
txt |
| Source |
rdacontent |
| 337 ## - MEDIA TYPE |
| Media type term |
unmediated |
| Media type code |
n |
| Source |
rdamedia |
| 338 ## - CARRIER TYPE |
| Carrier type term |
volume |
| Carrier type code |
nc |
| Source |
rdacarrier |
| 500 ## - GENERAL NOTE |
| General note |
Computer bookfair 2015. |
| 500 ## - GENERAL NOTE |
| General note |
Previous edition: 2010. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc |
Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
1. Information security essentials for IT managers / Albert Caballero --<br/>2. Security management systems / James T. Harmening --<br/>3. Information technology security management / Rahul Bhaskar and Bhushan Kapoor --<br/>4. Online identity and user management services / Tewfiq el Maliki and Jean-Marc Seigneur --<br/>5. Intrusion prevention and detection systems / Christopher Day --<br/>6. Firewalls / Dr. Errin W. Fulp --<br/>7. Penetration testing / Sanjay Bavisi --<br/>8. What is vulnerability assessment? / Almantas Kakareka --<br/>9. Cyber forensics / Scott R. Ellis --<br/>10. Cyber forensics and incident response / Cem Gurkok --<br/>11. Network forensics / Yong Guan. |
| 520 3# - SUMMARY, ETC. |
| Summary, etc |
"Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. Chapters contributed by leaders in the field covering foundational and practical aspects of information security management, allowing the reader to develop a new level of technical expertise found nowhere else. Comprehensive coverage by leading experts allows the reader to put current technologies to work. Presents methods of analysis and problem solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions". -- Cover. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security |
| General subdivision |
Management. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Electronic data processing departments |
| General subdivision |
Security measures. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer networks |
| General subdivision |
Security measures. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Penetration testing (Computer security) |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
vacca , johan R. |
| Relator term |
editor. |
| 9 (RLIN) |
33486 |
| Dates associated with a name |
1976- |
| 856 ## - ELECTRONIC LOCATION AND ACCESS |
| Materials specified |
Abstract |
| Uniform Resource Identifier |
<a href="http://repository.fue.edu.eg/xmlui/handle/123456789/3637">http://repository.fue.edu.eg/xmlui/handle/123456789/3637</a> |
| 906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
| a |
7 |
| b |
cbc |
| c |
copycat |
| d |
2 |
| e |
ncip |
| f |
20 |
| g |
y-gencatlg |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Dewey Decimal Classification |
| Koha item type |
Books |