Information security for managers / (Record no. 22668)

MARC details
000 -LEADER
fixed length control field 03556cam a22003375a 4500
001 - CONTROL NUMBER
control field 16926191
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20161017155525.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 110818t2013 maua frb 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2011033490
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780763793012 (pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0763793019 (pbk.)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Modifying agency EG-ScBUE
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 658.478
Item number WOR
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Workman, Michael D.,
Dates associated with a name 1957-
245 10 - TITLE STATEMENT
Title Information security for managers /
Statement of responsibility, etc Michael Workman, Daniel C. Phelps, John N. Gathegi.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Burlington :
Name of publisher, distributor, etc Jones & Bartlett Learning,
Date of publication, distribution, etc c.2013.
300 ## - PHYSICAL DESCRIPTION
Extent xxi, 593 p. :
Other physical details ill. ;
Dimensions 24 cm.
500 ## - GENERAL NOTE
General note Index : p. 555-593.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Section One: What Should Managers Know About Security: Policies and Procedures? 1. Introduction to Information Security ---<br/>2. Corporations and the Rule of Law ---<br/>3. Management, Security Law and Security Policies ---<br/>4. Security Regulations and Governance ---<br/>5. Security Programs, Risk Assessment and Management ---<br/>6. Managing Organizational Security ----<br/>Section Two: Technology Orientation for Managers. 7. Systems, Data, and Information ---<br/>8. Programming Concepts ---<br/>9. Applications Development ---<br/>10. Computer Operating Systems ---<br/>11. Networks and Addressing ---<br/>12. Protocols and Routing ----<br/>Section Three: Computer and Network Security. 13. Information Systems Security ---<br/>14. Computer Security ---<br/>15. Network Security ---<br/>16. Cryptographic Uses and Firewalls ---<br/>17. Cryptography Concepts ---<br/>18. Web Applications Security ----<br/>Section Four: Managing Organizations Securely. 19. Configuration Management ---<br/>20. Managing Security Operations ---<br/>21. Managing Security Behavior ---<br/>22. Modeling and Predicting Security Attacks ---<br/>23. Adaptive Systems Security ---<br/>24. Security Horizons: Issues for Managers.
520 ## - SUMMARY, ETC.
Summary, etc Information systems have improved over the years to become more effective in collecting and rendering information for consumers, although these improvements have been accompanied by increases in both frequency and sophistication of attacks against them. The impacts from attacks against companies are significant, and managers are responsible for their organizations' security. Failures can cause significant losses to companies and their suppliers and clients, and may cost managers their jobs, and may even possibly lead to legal liabilities that are adjudicated against them. This textbook takes a different approach than most texts on the subject, which are organized topically. Pedagogically, Information Security for Managers utilizes an incremental development method called knowledge scaffolding -- a proven educational technique for learning subject matter thoroughly by reinforced learning through an elaborative rehearsal process. This new resource includes coverage on threats to confidentiality, integrity, and availability, as well as countermeasures to preserve these. The textbook also draws extensively from the latest applied research and development, rather than simply rehashing materials and topics that are in nearly all of the extant textbooks and popular reading materials.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information technology
General subdivision Security measures.
Source of heading or term BUEsh
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
General subdivision Management.
Source of heading or term BUEsh
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
Source of heading or term BUEsh
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Business enterprises
General subdivision Security measures.
Source of heading or term BUEsh
651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME
Source of heading or term BUEsh
653 ## - INDEX TERM--UNCONTROLLED
Resource For college Informatics and Computer Science
Arrived date list October2016
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Phelps, Daniel C.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Gathegi, John Ng'ang'a.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
952 ## - LOCATION AND ITEM INFORMATION (KOHA)
-- 2016-10-17
Holdings
Withdrawn status Item status Source of classification or shelving scheme Damaged status Not for loan Vendor Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Serial Enumeration / chronology Total Checkouts Full call number Barcode Date last seen Cost, replacement price Koha item type
    Dewey Decimal Classification     Academic Bookshop Central Library Central Library First floor 17/10/2016 Purchase 437.00 9128   658.478 WOR 000034157 11/06/2024 546.00 Book - Borrowing