Fundamentals of information systems security / (Record no. 16151)

MARC details
000 -LEADER
fixed length control field 04432cam a22002778i 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20231205093807.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210505s2023 mau b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781284220735
Qualifying information (paperback)
040 ## - CATALOGING SOURCE
Original cataloging agency BUL
Transcribing agency BUL
Modifying agency BUL
Language of cataloging eng
Description conventions rda
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23
Classification number 005.8
Item number KIM
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Kim, David
245 10 - TITLE STATEMENT
Title Fundamentals of information systems security /
Statement of responsibility, etc. David Kim, and Michael G. Solomon.
250 ## - EDITION STATEMENT
Edition statement Fourth edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Burlington, Massachusetts :
Name of producer, publisher, distributor, manufacturer Jones & Bartlett Learning,
Date of production, publication, distribution, manufacture, or copyright notice [2023]
300 ## - PHYSICAL DESCRIPTION
Extent xxii, 550 p. :
Other physical details ill. ;
Dimensions 26cm
440 ## - SERIES STATEMENT/ADDED ENTRY--TITLE
Title ISSA- Information systems security and assurance series
500 ## - GENERAL NOTE
General note <br/> Table of Contents<br/><br/>Part I : The need for information security<br/><br/>Chapter 1. Information systems security<br/>Tenets of information systems security<br/>The seven domains of a typical IT infrastructure<br/>Weakest link in the security of an IT infrastructure<br/>IT security policy framework<br/>Data classification stanards<br/><br/>Chapter 2. Emerging technologyes are changing how we live<br/>Evolution pf the internate of things<br/>Converting to a TCP/IP World<br/>IoT's impact on human and Business life<br/>Evo;lution from brick and mortar to E-commerce<br/>Why businesses must have an internet and IoT marketing strategyy<br/>IP Mobility<br/>Mobile Applications<br/>New Challenges created by the IoT<br/><br/>Chapter 3. Risk Threats, and Vulnerabilities<br/>Risk Management and information security<br/>The risk managent process<br/>IT and network infrastructure<br/>Who are the perpetrators?<br/>Etc.<br/><br/>Chapter 4. Business Drivers of Information Security<br/>Risk management's importance to the organization<br/>Understanding the relationship between a BIA and BCP, and a DRP<br/>Assessing risks, threats and vulnerabilities<br/>Closing the information security gap<br/>Adhering to compliance laws<br/>Etc.<br/><br/>Part II : Securing today's information systems<br/><br/>Chapter 5. Networks and telecommunications<br/>The open systems interconnection reference model<br/>The main types of networks<br/>TCP/IP and how it works<br/>Network security risks<br/>Basic network security defense tools<br/>Etc.<br/><br/>Chapter 6. Access Controls<br/>Four-part access controls<br/>Two types of access controls<br/>Authorization policies<br/>Methods and guidelines for identification<br/>Processes and requirements for authentication<br/>Etc.<br/><br/>Chapter 7. Cryptography<br/>What is cryptography?<br/>Business and security requirements for cryptography<br/>Cryptographic principles, concepts, and terminoloy<br/>Types of ciphers<br/>Symmetric and asymmetric key cryptography<br/>Etc.<br/><br/>Chapter 8. Malicious software and atack vectors<br/>Characteristics, architecture, and operations of malicious software<br/>The main types of malware<br/>A brief history of malicious code threats<br/>Threats to business organizations<br/>Anatomy of an attack<br/>Etc.<br/><br/>Chapter 9. Security operations and administration<br/>Security administration<br/>Compliance<br/>Professional ethics<br/>The infrastructure of an IT security policy<br/>Data classification standards<br/>Etc. <br/><br/>Chapter 10. Auditing, testing and monitoring<br/>Security auditing and analysis<br/>Defining the audit plan<br/>Auditing benchmarks<br/>Audit data collection methods<br/>Post-audit activities<br/>Etc.<br/><br/>Chapter 11. Contingency planning<br/>Business continuity management<br/>Backing up data and applications<br/>Incident handling<br/>Recovery from a disaster<br/><br/>Chapter 12. Digital Forensics<br/>Introduction to digital forensics<br/>Overview of computer crime<br/>Forensic methods and labs<br/>Collecting, seizing and protecting evidence<br/>Recovering data<br/>Etc.<br/><br/>Part IIII : Information security standards, certifications and laws<br/><br/>Chapter 13. Information security satndards <br/>Standards organizations<br/>ISO 17799 (Withdrawn)<br/>Payment card industry data security standard<br/><br/>Chapter 14. Information security certifications<br/>U.S Department of defense/Military directive 8570.01<br/>Vendor-Neutral Professional certification<br/>Vendor-specific professional certifications<br/><br/>Chapter 15. Compliance laws<br/>Compliance is the law<br/>Federal information security<br/>The health insurance portability and accountability act (HIPAA)<br/>The Gramm-Leach- Bliley Act<br/>The Sarbanes- Oxley Act<br/>Etc.<br/><br/><br/>
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references p. 525-530 and index p. 531-550
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information storage and retrieval systems
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Solomon, Michael
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book Closed Access
Edition 4th edition.
Classification part 005.8
Item part 1
Call number prefix KIM
Call number suffix 005.8 KIM
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Inventory number Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Science and Education Library Science and Education Library 12/05/2023 PURCHASE 0030506   005.8 KIM 1 NAGL23120108 12/15/2023 1 12/05/2023 Book Closed Access
    Dewey Decimal Classification     Science and Education Library Science and Education Library 12/05/2023 PURCHASE 0030506   005.8 KIM 1 NAGL23120109 12/15/2023 2 12/05/2023 Book Closed Access