MARC details
000 -LEADER |
fixed length control field |
04432cam a22002778i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20231205093807.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
210505s2023 mau b 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781284220735 |
Qualifying information |
(paperback) |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
BUL |
Transcribing agency |
BUL |
Modifying agency |
BUL |
Language of cataloging |
eng |
Description conventions |
rda |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Edition number |
23 |
Classification number |
005.8 |
Item number |
KIM |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Kim, David |
245 10 - TITLE STATEMENT |
Title |
Fundamentals of information systems security / |
Statement of responsibility, etc. |
David Kim, and Michael G. Solomon. |
250 ## - EDITION STATEMENT |
Edition statement |
Fourth edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Burlington, Massachusetts : |
Name of producer, publisher, distributor, manufacturer |
Jones & Bartlett Learning, |
Date of production, publication, distribution, manufacture, or copyright notice |
[2023] |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxii, 550 p. : |
Other physical details |
ill. ; |
Dimensions |
26cm |
440 ## - SERIES STATEMENT/ADDED ENTRY--TITLE |
Title |
ISSA- Information systems security and assurance series |
500 ## - GENERAL NOTE |
General note |
<br/> Table of Contents<br/><br/>Part I : The need for information security<br/><br/>Chapter 1. Information systems security<br/>Tenets of information systems security<br/>The seven domains of a typical IT infrastructure<br/>Weakest link in the security of an IT infrastructure<br/>IT security policy framework<br/>Data classification stanards<br/><br/>Chapter 2. Emerging technologyes are changing how we live<br/>Evolution pf the internate of things<br/>Converting to a TCP/IP World<br/>IoT's impact on human and Business life<br/>Evo;lution from brick and mortar to E-commerce<br/>Why businesses must have an internet and IoT marketing strategyy<br/>IP Mobility<br/>Mobile Applications<br/>New Challenges created by the IoT<br/><br/>Chapter 3. Risk Threats, and Vulnerabilities<br/>Risk Management and information security<br/>The risk managent process<br/>IT and network infrastructure<br/>Who are the perpetrators?<br/>Etc.<br/><br/>Chapter 4. Business Drivers of Information Security<br/>Risk management's importance to the organization<br/>Understanding the relationship between a BIA and BCP, and a DRP<br/>Assessing risks, threats and vulnerabilities<br/>Closing the information security gap<br/>Adhering to compliance laws<br/>Etc.<br/><br/>Part II : Securing today's information systems<br/><br/>Chapter 5. Networks and telecommunications<br/>The open systems interconnection reference model<br/>The main types of networks<br/>TCP/IP and how it works<br/>Network security risks<br/>Basic network security defense tools<br/>Etc.<br/><br/>Chapter 6. Access Controls<br/>Four-part access controls<br/>Two types of access controls<br/>Authorization policies<br/>Methods and guidelines for identification<br/>Processes and requirements for authentication<br/>Etc.<br/><br/>Chapter 7. Cryptography<br/>What is cryptography?<br/>Business and security requirements for cryptography<br/>Cryptographic principles, concepts, and terminoloy<br/>Types of ciphers<br/>Symmetric and asymmetric key cryptography<br/>Etc.<br/><br/>Chapter 8. Malicious software and atack vectors<br/>Characteristics, architecture, and operations of malicious software<br/>The main types of malware<br/>A brief history of malicious code threats<br/>Threats to business organizations<br/>Anatomy of an attack<br/>Etc.<br/><br/>Chapter 9. Security operations and administration<br/>Security administration<br/>Compliance<br/>Professional ethics<br/>The infrastructure of an IT security policy<br/>Data classification standards<br/>Etc. <br/><br/>Chapter 10. Auditing, testing and monitoring<br/>Security auditing and analysis<br/>Defining the audit plan<br/>Auditing benchmarks<br/>Audit data collection methods<br/>Post-audit activities<br/>Etc.<br/><br/>Chapter 11. Contingency planning<br/>Business continuity management<br/>Backing up data and applications<br/>Incident handling<br/>Recovery from a disaster<br/><br/>Chapter 12. Digital Forensics<br/>Introduction to digital forensics<br/>Overview of computer crime<br/>Forensic methods and labs<br/>Collecting, seizing and protecting evidence<br/>Recovering data<br/>Etc.<br/><br/>Part IIII : Information security standards, certifications and laws<br/><br/>Chapter 13. Information security satndards <br/>Standards organizations<br/>ISO 17799 (Withdrawn)<br/>Payment card industry data security standard<br/><br/>Chapter 14. Information security certifications<br/>U.S Department of defense/Military directive 8570.01<br/>Vendor-Neutral Professional certification<br/>Vendor-specific professional certifications<br/><br/>Chapter 15. Compliance laws<br/>Compliance is the law<br/>Federal information security<br/>The health insurance portability and accountability act (HIPAA)<br/>The Gramm-Leach- Bliley Act<br/>The Sarbanes- Oxley Act<br/>Etc.<br/><br/><br/> |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references p. 525-530 and index p. 531-550 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Information storage and retrieval systems |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Solomon, Michael |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Book Closed Access |
Edition |
4th edition. |
Classification part |
005.8 |
Item part |
1 |
Call number prefix |
KIM |
Call number suffix |
005.8 KIM |