Information assurance for the enterprise : a roadmap to information security (Record no. 207)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01893nam a2200229Ia 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20250730165042.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 250728s9999 xx 000 0 und d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 978-0-7-128295-6 |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | C 005.6 Sc6i |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Schou, Corey |
| 245 #0 - TITLE STATEMENT | |
| Title | Information assurance for the enterprise : a roadmap to information security |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | New York |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Name of publisher, distributor, etc. | McGraw-Hill |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Date of publication, distribution, etc. | 2007 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xxiii, 480p. ; ill. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Other physical details | Includes index |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Going beyond the technical coverage of computer and systems security measures, Information Assurance for the Enterprise provides readers an overarching model for information assurance for businesses, government agencies, and other enterprises needing to establish a comprehensive plan. All the components of security and how they relate are featured, and readers will also be shown how an effective security policy can be developed. Topics like asset identification, human factors, compliance with regulations, personnel security, risk assessment and ethical considerations are covered, as well as computer and network security tools and methods. This is one of the only texts on the market that provides an up-to-date look at the whole range of security and IA topics. In post-9/11 times, managers and IT professionals need to address a wide range of security-related issues, and develop security systems that take all these diverse factors into account. As someone who has worked extensively with the U.S. State Department and other governmental agencies, Corey Schou is uniquely positioned to write the definitive book on the subject; and Daniel Shoemaker is a professor and consultant to the Department of Homeland Security in matters of Information Assurance policy.--Publisher description |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer Security |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Data protection |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Shoemaker, Dan |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | Book |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Total checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| PCC | PCC | CIRCULATION | 07/30/2025 | C 005.6 Sc6i | 4192 | 07/30/2025 | 07/30/2025 | Book |