Principles of information security (Record no. 2051)

MARC details
000 -LEADER
fixed length control field 02113nam a22002177a 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220606173804.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220316b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789387994232
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 658.472
Item number WHI
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Whitman, Michael E.
245 ## - TITLE STATEMENT
Title Principles of information security
250 ## - EDITION STATEMENT
Edition statement 6th
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc. Cengage Learning India Pvt. Ltd.
Place of publication, distribution, etc. New Delhi
Date of publication, distribution, etc. 2018
300 ## - PHYSICAL DESCRIPTION
Extent xx, 728 p.
365 ## - TRADE PRICE
Price type code INR
Price amount 699.00
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Table of content<br/><br/>1. Introduction to Information Security.<br/><br/>2. The Need for Security.<br/><br/>3. Legal, Ethical, and Professional Issues in Information Security.<br/><br/>4. Planning for Security.<br/><br/>5. Risk Management.<br/><br/>6. Security Technology: Firewalls, VPNs, and Wireless.<br/><br/>7. Security Technology: Intrusion Detection and Prevention Systems and Other Security Tools.<br/><br/>8. Cryptography.<br/><br/>9. Physical Security.<br/><br/>10. Implementing Information Security.<br/><br/>11. Security and Personnel.<br/><br/>12. Information Security Maintenance and eDiscovery.
520 ## - SUMMARY, ETC.
Summary, etc. Introduce the latest technology and developments with the book specifically oriented to the needs of information systems students: PRINCIPLES OF INFORMATION SECURITY, 6E. Taking a managerial approach, this market-leading introductory book emphasizes all the aspects of information security -- not just the technical control perspective. Students gain a broad overview of the entire field of information security and related elements with the detail to ensure understanding. Students review terms used in the field, a history of the discipline, and an overview of how to manage an information security program. Current and relevant, this edition highlights the latest practices with fresh examples that explore the impact of emerging technologies, such as the Internet of Things, Cloud Computing, and DevOps. Updates address technical security controls, emerging legislative issues, digital forensics, and ethical issues in IS security, making it ideal for business decision-makers.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information technology- Security measures
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Mattord, Herbert J.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Full call number Accession Number Date last seen Copy number Cost, replacement price Price effective from Koha item type Bill No Bill Date
    Dewey Decimal Classification     IT & Decisions Sciences Indian Institute of Management LRC Indian Institute of Management LRC General Stacks 03/16/2022 University Book House Pvt. Ltd. 489.30   658.472 WHI 002215 03/16/2022 1 699.00 03/16/2022 Book 31700 07-03-2022

©2019-2020 Learning Resource Centre, Indian Institute of Management Bodhgaya

Powered by Koha