MARC details
000 -LEADER |
fixed length control field |
03556cam a22003375a 4500 |
001 - CONTROL NUMBER |
control field |
16926191 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20161017155525.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
110818t2013 maua frb 001 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2011033490 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780763793012 (pbk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0763793019 (pbk.) |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
Modifying agency |
EG-ScBUE |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
658.478 |
Item number |
WOR |
Edition number |
22 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Workman, Michael D., |
Dates associated with a name |
1957- |
245 10 - TITLE STATEMENT |
Title |
Information security for managers / |
Statement of responsibility, etc |
Michael Workman, Daniel C. Phelps, John N. Gathegi. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Burlington : |
Name of publisher, distributor, etc |
Jones & Bartlett Learning, |
Date of publication, distribution, etc |
c.2013. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxi, 593 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm. |
500 ## - GENERAL NOTE |
General note |
Index : p. 555-593. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Section One: What Should Managers Know About Security: Policies and Procedures? 1. Introduction to Information Security ---<br/>2. Corporations and the Rule of Law ---<br/>3. Management, Security Law and Security Policies ---<br/>4. Security Regulations and Governance ---<br/>5. Security Programs, Risk Assessment and Management ---<br/>6. Managing Organizational Security ----<br/>Section Two: Technology Orientation for Managers. 7. Systems, Data, and Information ---<br/>8. Programming Concepts ---<br/>9. Applications Development ---<br/>10. Computer Operating Systems ---<br/>11. Networks and Addressing ---<br/>12. Protocols and Routing ----<br/>Section Three: Computer and Network Security. 13. Information Systems Security ---<br/>14. Computer Security ---<br/>15. Network Security ---<br/>16. Cryptographic Uses and Firewalls ---<br/>17. Cryptography Concepts ---<br/>18. Web Applications Security ----<br/>Section Four: Managing Organizations Securely. 19. Configuration Management ---<br/>20. Managing Security Operations ---<br/>21. Managing Security Behavior ---<br/>22. Modeling and Predicting Security Attacks ---<br/>23. Adaptive Systems Security ---<br/>24. Security Horizons: Issues for Managers. |
520 ## - SUMMARY, ETC. |
Summary, etc |
Information systems have improved over the years to become more effective in collecting and rendering information for consumers, although these improvements have been accompanied by increases in both frequency and sophistication of attacks against them. The impacts from attacks against companies are significant, and managers are responsible for their organizations' security. Failures can cause significant losses to companies and their suppliers and clients, and may cost managers their jobs, and may even possibly lead to legal liabilities that are adjudicated against them. This textbook takes a different approach than most texts on the subject, which are organized topically. Pedagogically, Information Security for Managers utilizes an incremental development method called knowledge scaffolding -- a proven educational technique for learning subject matter thoroughly by reinforced learning through an elaborative rehearsal process. This new resource includes coverage on threats to confidentiality, integrity, and availability, as well as countermeasures to preserve these. The textbook also draws extensively from the latest applied research and development, rather than simply rehashing materials and topics that are in nearly all of the extant textbooks and popular reading materials. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Information technology |
General subdivision |
Security measures. |
Source of heading or term |
BUEsh |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security |
General subdivision |
Management. |
Source of heading or term |
BUEsh |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures. |
Source of heading or term |
BUEsh |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Business enterprises |
General subdivision |
Security measures. |
Source of heading or term |
BUEsh |
651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME |
Source of heading or term |
BUEsh |
653 ## - INDEX TERM--UNCONTROLLED |
Resource For college |
Informatics and Computer Science |
Arrived date list |
October2016 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Phelps, Daniel C. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Gathegi, John Ng'ang'a. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
952 ## - LOCATION AND ITEM INFORMATION (KOHA) |
-- |
2016-10-17 |