Midlands State University Library

Computer and information security handbook / (Record no. 156734)

MARC details
000 -LEADER
fixed length control field 01616nam a22002777a 4500
003 - CONTROL NUMBER IDENTIFIER
control field ZW-GwMSU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210427092340.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210427b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780128038437
040 ## - CATALOGING SOURCE
Transcribing agency MSULIB
Description conventions rda
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25 VAC
245 1# - TITLE STATEMENT
Title Computer and information security handbook /
Statement of responsibility, etc edited by John R. Vacca
250 ## - EDITION STATEMENT
Edition statement Third edition
264 1# - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Name of producer, publisher, distributor, manufacturer Morgan Kaufmann Publishers,
Date of production, publication, distribution, manufacture, or copyright notice [2017]
300 ## - PHYSICAL DESCRIPTION
Extent 1237 pages
Other physical details illustrations.
336 ## - CONTENT TYPE
Source rdacontent
content type term text
337 ## - MEDIA TYPE
source rdamedia
media type term unmediated
media type code n
338 ## - CARRIER TYPE
source rdacarrier
carrier type term volume
carrier type code nc
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Part 1: Overview of System and Network Security: A Comprehensive Introduction; Part 2: Managing Information Security; Part 3: Disaster Recovery Security; Part 4: Security Standards and Policies; Part 5: Cyber, Network, and Systems Forensics Security and Assurance; Part 6: Encryption Technology; Part 7: Privacy and Access Management; Part 8: Storage Security; Part 9: Cloud Security; Part 10: Virtual SecurityPart 11: Cyber Physical Security; Part 12: Practical Security; Part 13: Critical Infrastructure Security; Part 14: Advanced Security
520 ## - SUMMARY, ETC.
Summary, etc This comprehensive reference on computer security offers deep coverage of a wide range of issues in computer and cyber security theory, applications, and best practices.-- Adapted from publisher's description
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Penetration testing (Computer security)
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS
General subdivision Internet
-- Security.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Full call number Barcode Date last seen Copy number Price effective from Koha item type Public note
    Library of Congress Classification     Main Library Main Library Core Collection 27/04/2021 Book Aid International 130.00 QA76.9.A25 COM BK139747 27/04/2021 152404 27/04/2021 Core Collection Donation
    Library of Congress Classification     Main Library Main Library Open Shelf 27/04/2021 Book Aid International 130.00 QA76.9.A25 COM BK139813 27/04/2021 152405 27/04/2021 Book Donation
    Library of Congress Classification     Main Library Main Library Open Shelf 27/04/2021 Book Aid International 130.00 QA76.9.A25 COM BK139819 27/04/2021 152406 27/04/2021 Book Donation