MARC details
000 -LEADER |
fixed length control field |
03981nam a2200565 i 4500 |
001 - CONTROL NUMBER |
control field |
11102290 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
CaPaEBR |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20241023114840.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS |
fixed length control field |
m eo d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr cn |||m|||a |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
151125s2016 nyu foab 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781606499177 |
Qualifying information |
|
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)930531034 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(CaBNVSL)swl00405833 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
CaBNVSL |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
CaBNVSL |
Modifying agency |
CaBNVSL |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Sagers, Glen., |
Relator term |
|
245 10 - TITLE STATEMENT |
Title |
Information technology security fundamentals / |
Statement of responsibility, etc. |
Glen Sagers, Bryan Hosack. |
250 ## - EDITION STATEMENT |
Edition statement |
First edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
New York, New York (222 East 46th Street, New York, NY 10017) : |
Name of producer, publisher, distributor, manufacturer |
Business Expert Press, |
Date of production, publication, distribution, manufacture, or copyright notice |
[(c)2016.] |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource (xiv, 157 pages) |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
computer |
Media type code |
c |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Carrier type code |
cr |
Source |
rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS |
File type |
data file |
Source |
rda |
490 1# - SERIES STATEMENT |
Series statement |
Information systems collection, |
ISBN |
2156-6593 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
|
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
1. Security and information assurance -- |
Title |
2. Operating system security -- |
-- |
3. Data security: protecting your information -- |
-- |
4. Keeping the electronic highways safe -- |
-- |
5. We released what?!? (application security) -- |
-- |
6. Cracking the code (cryptography) -- |
-- |
7. Danger! danger! danger! (penetration testing) -- |
-- |
8. Disaster recovery -- |
-- |
9. Integrating your security plan across the enterprise -- |
-- |
10. Conclusion -- |
-- |
Glossary -- |
-- |
Appendix A -- |
-- |
Endnotes -- |
-- |
Index. |
506 ## - RESTRICTIONS ON ACCESS NOTE |
Terms governing access |
Access restricted to authorized users and institutions. |
520 3# - SUMMARY, ETC. |
Summary, etc. |
Information security is at the forefront of timely IT topics, due to the spectacular and well-publicized breaches of personal information stored by companies. To create a secure IT environment, many steps must be taken, but not all steps are created equal. There are technological measures that increase security, and some that do not do as well, but overall, the best defense is to create a culture of security in the organization. Such a culture makes each member ask themselves what security implications an action will have. The culture extends from someone at reception deciding to whether to admit a visitor to upper management determining whether a strategic alliance with another firm which links their corporate information systems. The same principles that guide IT security in the enterprise guide smaller organizations and individuals. The individual techniques and tools may vary by size, but everyone with a computer needs to turn on a firewall, and have antivirus software. Personal information should be safeguarded by individuals, and by the firms entrusted with it. As organizations and people develop security plans, and put the technical pieces in place, a system can emerge that is greater than the sum of its parts. Improving computing security really means education, whether of oneself, one's employees, or one's family. Thinking "security first" may seem paranoid, but in today's world, experience shows that it reflects reality. |
530 ## - COPYRIGHT INFORMATION: |
COPYRIGHT INFORMATION |
COPYRIGHT NOT covered - Click this link to request copyright permission: |
Uniform Resource Identifier |
<a href="b">b</a> |
530 ## - COPYRIGHT INFORMATION: |
COPYRIGHT INFORMATION |
|
538 ## - SYSTEM DETAILS NOTE |
System details note |
Mode of access: World Wide Web. |
538 ## - SYSTEM DETAILS NOTE |
System details note |
System requirements: Adobe Acrobat reader. |
588 ## - SOURCE OF DESCRIPTION NOTE |
Source of description note |
Title from PDF title page (viewed on November 25, 2015). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Data protection. |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
Information Assurance |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
Computer Security |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
Personal Computing Security |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
Personally Identifiable Information (PII) |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
Network Security |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
Encryption |
655 #0 - INDEX TERM--GENRE/FORM |
Genre/form data or focus term |
[genre] |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Hosack, Bryan., |
Relator term |
|
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Print version: |
International Standard Book Number |
9781606499160 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Information systems collection. |
International Standard Serial Number |
2156-6593 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000401.html">https://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000401.html</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Usage before 2021-2022 |
CIU |
Koha item type |
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) |
VENDOR |
Business Expert Press |
LOCATION |
ONLINE |
Barecode |
BEP11102290 |
902 ## - LOCAL DATA ELEMENT B, LDB (RLIN) |
c |
1 |
d |
Cynthia Snell |