Information technology security fundamentals / (Record no. 73866)

MARC details
000 -LEADER
fixed length control field 03981nam a2200565 i 4500
001 - CONTROL NUMBER
control field 11102290
003 - CONTROL NUMBER IDENTIFIER
control field CaPaEBR
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20241023114840.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m eo d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn |||m|||a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 151125s2016 nyu foab 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781606499177
Qualifying information
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)930531034
035 ## - SYSTEM CONTROL NUMBER
System control number (CaBNVSL)swl00405833
040 ## - CATALOGING SOURCE
Original cataloging agency CaBNVSL
Language of cataloging eng
Description conventions rda
Transcribing agency CaBNVSL
Modifying agency CaBNVSL
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Sagers, Glen.,
Relator term
245 10 - TITLE STATEMENT
Title Information technology security fundamentals /
Statement of responsibility, etc. Glen Sagers, Bryan Hosack.
250 ## - EDITION STATEMENT
Edition statement First edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture New York, New York (222 East 46th Street, New York, NY 10017) :
Name of producer, publisher, distributor, manufacturer Business Expert Press,
Date of production, publication, distribution, manufacture, or copyright notice [(c)2016.]
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (xiv, 157 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type data file
Source rda
490 1# - SERIES STATEMENT
Series statement Information systems collection,
ISBN 2156-6593
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Security and information assurance --
Title 2. Operating system security --
-- 3. Data security: protecting your information --
-- 4. Keeping the electronic highways safe --
-- 5. We released what?!? (application security) --
-- 6. Cracking the code (cryptography) --
-- 7. Danger! danger! danger! (penetration testing) --
-- 8. Disaster recovery --
-- 9. Integrating your security plan across the enterprise --
-- 10. Conclusion --
-- Glossary --
-- Appendix A --
-- Endnotes --
-- Index.
506 ## - RESTRICTIONS ON ACCESS NOTE
Terms governing access Access restricted to authorized users and institutions.
520 3# - SUMMARY, ETC.
Summary, etc. Information security is at the forefront of timely IT topics, due to the spectacular and well-publicized breaches of personal information stored by companies. To create a secure IT environment, many steps must be taken, but not all steps are created equal. There are technological measures that increase security, and some that do not do as well, but overall, the best defense is to create a culture of security in the organization. Such a culture makes each member ask themselves what security implications an action will have. The culture extends from someone at reception deciding to whether to admit a visitor to upper management determining whether a strategic alliance with another firm which links their corporate information systems. The same principles that guide IT security in the enterprise guide smaller organizations and individuals. The individual techniques and tools may vary by size, but everyone with a computer needs to turn on a firewall, and have antivirus software. Personal information should be safeguarded by individuals, and by the firms entrusted with it. As organizations and people develop security plans, and put the technical pieces in place, a system can emerge that is greater than the sum of its parts. Improving computing security really means education, whether of oneself, one's employees, or one's family. Thinking "security first" may seem paranoid, but in today's world, experience shows that it reflects reality.
530 ## - COPYRIGHT INFORMATION:
COPYRIGHT INFORMATION COPYRIGHT NOT covered - Click this link to request copyright permission:
Uniform Resource Identifier <a href="b">b</a>
530 ## - COPYRIGHT INFORMATION:
COPYRIGHT INFORMATION
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: World Wide Web.
538 ## - SYSTEM DETAILS NOTE
System details note System requirements: Adobe Acrobat reader.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Title from PDF title page (viewed on November 25, 2015).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection.
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Information Assurance
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Computer Security
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Personal Computing Security
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Personally Identifiable Information (PII)
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Network Security
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Encryption
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term [genre]
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Hosack, Bryan.,
Relator term
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
International Standard Book Number 9781606499160
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Information systems collection.
International Standard Serial Number 2156-6593
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000401.html">https://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000401.html</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Usage before 2021-2022 CIU
Koha item type Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD)
VENDOR Business Expert Press
LOCATION ONLINE
Barecode BEP11102290
902 ## - LOCAL DATA ELEMENT B, LDB (RLIN)
c 1
d Cynthia Snell
Holdings
Withdrawn status Lost status Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type Source of classification or shelving scheme Uniform Resource Identifier
        Non-fiction G. Allen Fleece Library G. Allen Fleece Library   03/20/2023 Business Expert Press   QA76.9.A25 11102290 03/20/2023 03/20/2023 Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD)    
          G. Allen Fleece Library G. Allen Fleece Library ONLINE 10/23/2024 Business Expert Press   QA76.9.A25 BEP11102290 10/23/2024 10/23/2024 Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) Library of Congress Classification https://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000401.html