It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 06743cam 2201033Ma 4500
001 ocm45843766
003 OCoLC
005 20200105194653.0
008 010124s2000 ilu obf 001 0 eng d
006 m o d
007 cr cn|||||||||
040 $aN$T$beng$epn$cN$T$dOCL$dOCLCQ$dJYJ$dOCLCQ$dYDXCP$dOCLCQ$dTUU$dOCLCQ$dTNF$dIDA$dOCLCQ$dZCU$dOCLCO$dOCLCF$dOPU$dN$T$dOCLCQ$dOCLCO$dOCLCQ$dOCL$dOCLCO$dOCLCQ$dDCWBL$dOCLCQ$dSAV$dOCLCQ$dICD$dQT7$dOCLCA$dLUE$dVTS$dCEF$dAGLDB$dOCLCQ$dINT$dTOF$dOCLCQ$dBRX$dTKN$dSTF$dM8D$dJX9$dUKAHL$dUMK$dHS0
019 $a533154334$a758976238$a869376415$a961614430$a962706414$a992280411$a993726997
020 $a0814424554$q(electronic bk.)
020 $a9780814424551$q(electronic bk.)
020 $a9781135961732$q(electronic bk.)
020 $a1135961735$q(electronic bk.)
020 $z0814405797
020 $z9780814405796
020 $z1888998857
020 $z9781888998856
020 $z1579582591
020 $z9781579582593
035 $a(OCoLC)45843766$z(OCoLC)533154334$z(OCoLC)758976238$z(OCoLC)869376415$z(OCoLC)961614430$z(OCoLC)962706414$z(OCoLC)992280411$z(OCoLC)993726997
050 4 $aQA76.9$b.S55 2000eb
072 7 $aCOM$x060040$2bisacsh
072 7 $aCOM$x043050$2bisacsh
072 7 $aCOM$x053000$2bisacsh
082 04 $a005.8$221
100 1 $aShim, Jae K.
245 14 $aThe international handbook of computer security /$cJae K. Shim [and others].
260 $aChicago, Ill. :$bGlenlake Pub.,$c℗♭2000.
300 $a1 online resource (xii, 260 pages)
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
500 $aIncludes index.
505 00 $gChapter 1$tOrganizational Policy$g1 --$gChapter 2$tPhysical Security and Data Preservation$g11 --$gChapter 3$tHardware Security$g33 --$gChapter 4$tSoftware Security$g67 --$gChapter 5$tPersonnel Security$g109 --$gChapter 6$tNetwork Security$g117 --$gAppendix 6.A$tCommercial Firewalls$g145 --$gAppendix 6.B$tFirewall Resellers$g153 --$gAppendix 6.C$tPublic Domain, Shareware, etc.$g163 --$gChapter 7$tSecurity Policy$g165 --$gAppendix 7.A$tSources of Information Security Policies$g178 --$gAppendix 7.B$tSample Computer Policy$g179 --$gChapter 8$tContingency Planning$g191 --$gAppendix 8.A$tBusiness Impact Analysis Worksheet$g213 --$gAppendix 8.B$tCommunications Assessment Questionnaire$g215 --$gAppendix 8.C$tInsurance Recovery Program$g217 --$gAppendix 8.D$tMaking an Insurance Claim$g219 --$gChapter 9$tAuditing and Legal Issues$g221 --$gAppendix$tSecurity Software$g235.
520 $aThe international handbook of computer security is written primarily to help business executives and information systems/computer professionals protect computer systems and data from a myriad of internal and external threats. The book addresses a wide range of computer security issues. It is intended to provide practical and thorough guidance in the quagmire of computers, technology, networks, and software. Among the major topics discussed are : company security policies, data preservation and protection, personnel management and security, legal and auditing planning and control, network security, internal and external systems, physical security procedures, hardware and software protection, contingency planning.
588 0 $aPrint version record.
504 $aIncludes bibliographical references and index.
650 0 $aComputer security.
650 0 $aComputer networks$xSecurity measures.
650 0 $aInternet$xSecurity measures.
650 6 $aSe curite informatique$vGuides, manuels, etc.
650 6 $aProtection de l'information (Informatique)$vGuides, manuels, etc.
650 6 $aRe seaux d'ordinateurs$xSe curite $xMesures$vGuides, manuels, etc.
650 7 $aCOMPUTERS$xInternet$xSecurity.$2bisacsh
650 7 $aCOMPUTERS$xNetworking$xSecurity.$2bisacsh
650 7 $aCOMPUTERS$xSecurity$xGeneral.$2bisacsh
650 7 $aComputer networks$xSecurity measures.$2fast$0(OCoLC)fst00872341
650 7 $aComputer security.$2fast$0(OCoLC)fst00872484
650 7 $aInternet$xSecurity measures.$2fast$0(OCoLC)fst01751426
650 7 $aEngineering & Applied Sciences.$2hilcc
650 7 $aComputer Science.$2hilcc
650 7 $aSEGURANC ʹA EM COMPUTADOR.$2larpcal
650 7 $aREDES DE COMPUTADORES.$2larpcal
655 0 $aElectronic books.
655 4 $aElectronic books.
655 7 $aHandbooks and manuals.$2lcgft
700 1 $aShim, Jae K.
700 1 $aQureshi, Anique A.
700 1 $aSiegel, Joel G.
776 08 $iPrint version:$aShim, Jae K.$tInternational handbook of computer security.$dChicago, Ill. : Glenlake Pub., ℗♭2000$z0814405797
856 40 $3EBSCOhost$uhttp://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=46506
856 40 $3EBSCOhost$uhttp://search.ebscohost.com/login.aspx?direct=true&db=nlebk&db=nlabk&site=ehost-live&scope=site&AN=46506
856 40 $3EBSCOhost$uhttp://0-search.ebscohost.com.librarycatalog.vts.edu/login.aspx?direct=true&scope=site&db=nlebk&AN=46506
856 4 $3EBSCOhost$uhttp://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=46506
856 40 $3NetLibrary$uhttps://elib.southwest.tn.edu:3443/login?url=http://www.netlibrary.com/urlapi.asp?action=summary&v=1&bookid=46506$zClick to view electronic book.
856 4 $uhttp://proxy.library.carleton.ca/login?url=http://www.netLibrary.com/urlapi.asp?action=summary&v=1&bookid=46506$zeBooks on EBSCOhost
856 4 $3NetLibrary$uhttp://www.netlibrary.com/urlapi.asp?action=summary&v=1&bookid=46506
856 4 $uhttp://www.lib.utk.edu/cgi-bin/auth/connect.cgi?netlibrary=46506$zOnline access - 1 simultaneous user
856 40 $uhttp://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=46506$xWMS$yEBSCO Academic Comprehensive Collection$xProvider: EBSCO$xsubscribed$xeLoaderURL$xuc4$xucocm45843766
856 40 $uhttp://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781135961664
856 40 $uhttp://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781135961732
938 $aAskews and Holts Library Services$bASKH$nAH25841523
938 $aAskews and Holts Library Services$bASKH$nAH25841522
938 $aEBSCOhost$bEBSC$n46506
938 $aYBP Library Services$bYANK$n2343079
938 $aYBP Library Services$bYANK$n11396977
938 $aYBP Library Services$bYANK$n11418432
029 1 $aAU@$b000023013355
029 1 $aAU@$b000051373837
029 1 $aDEBBG$bBV043145391
029 1 $aDEBSZ$b422503118
029 1 $aGBVCP$b800746635
029 1 $aAU@$b000065164518
994 $aZ0$bP4A
948 $hNO HOLDINGS IN P4A - 1907 OTHER HOLDINGS