Record ID | marc_columbia/Columbia-extract-20221130-031.mrc:8851413:5627 |
Source | marc_columbia |
Download Link | /show-records/marc_columbia/Columbia-extract-20221130-031.mrc:8851413:5627?format=raw |
LEADER: 05627cam a2200925Ma 4500
001 15062505
005 20221008230503.0
006 m o d
007 cr cn|||||||||
008 010124s2000 ilu obf 001 0 eng d
035 $a(OCoLC)ocm45843766
035 $a(NNC)15062505
040 $aN$T$beng$epn$cN$T$dOCL$dOCLCQ$dJYJ$dOCLCQ$dYDXCP$dOCLCQ$dTUU$dOCLCQ$dTNF$dIDA$dOCLCQ$dZCU$dOCLCO$dOCLCF$dOPU$dN$T$dOCLCQ$dOCLCO$dOCLCQ$dOCL$dOCLCO$dOCLCQ$dDCWBL$dOCLCQ$dSAV$dOCLCQ$dICD$dQT7$dOCLCA$dLUE$dVTS$dCEF$dAGLDB$dOCLCQ$dINT$dTOF$dOCLCQ$dBRX$dTKN$dSTF$dM8D$dJX9$dUKAHL$dUMK$dHS0$dOCL$dOCLCO$dVLY$dTUHNV$dOCLCO$dOCL
019 $a533154334$a758976238$a869376415$a961614430$a962706414$a992280411$a993726997$a1162245535$a1165274427$a1243587098
020 $a0814424554$q(electronic bk.)
020 $a9780814424551$q(electronic bk.)
020 $a9781135961732$q(electronic bk.)
020 $a1135961735$q(electronic bk.)
020 $z0814405797
020 $z9780814405796
020 $z1888998857
020 $z9781888998856
020 $z1579582591
020 $z9781579582593
035 $a(OCoLC)45843766$z(OCoLC)533154334$z(OCoLC)758976238$z(OCoLC)869376415$z(OCoLC)961614430$z(OCoLC)962706414$z(OCoLC)992280411$z(OCoLC)993726997$z(OCoLC)1162245535$z(OCoLC)1165274427$z(OCoLC)1243587098
050 4 $aQA76.9$b.S55 2000eb
072 7 $aCOM$x060040$2bisacsh
072 7 $aCOM$x043050$2bisacsh
072 7 $aCOM$x053000$2bisacsh
082 04 $a005.8$221
049 $aZCUA
100 1 $aShim, Jae K.
245 14 $aThe international handbook of computer security /$cJae K. Shim [and others].
260 $aChicago, Ill. :$bGlenlake Pub.,$c©2000.
300 $a1 online resource (xii, 260 pages)
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
500 $aIncludes index.
505 00 $gChapter 1$tOrganizational Policy$g1 --$gChapter 2$tPhysical Security and Data Preservation$g11 --$gChapter 3$tHardware Security$g33 --$gChapter 4$tSoftware Security$g67 --$gChapter 5$tPersonnel Security$g109 --$gChapter 6$tNetwork Security$g117 --$gAppendix 6.A$tCommercial Firewalls$g145 --$gAppendix 6.B$tFirewall Resellers$g153 --$gAppendix 6.C$tPublic Domain, Shareware, etc.$g163 --$gChapter 7$tSecurity Policy$g165 --$gAppendix 7.A$tSources of Information Security Policies$g178 --$gAppendix 7.B$tSample Computer Policy$g179 --$gChapter 8$tContingency Planning$g191 --$gAppendix 8.A$tBusiness Impact Analysis Worksheet$g213 --$gAppendix 8.B$tCommunications Assessment Questionnaire$g215 --$gAppendix 8.C$tInsurance Recovery Program$g217 --$gAppendix 8.D$tMaking an Insurance Claim$g219 --$gChapter 9$tAuditing and Legal Issues$g221 --$gAppendix$tSecurity Software$g235.
520 $aThe international handbook of computer security is written primarily to help business executives and information systems/computer professionals protect computer systems and data from a myriad of internal and external threats. The book addresses a wide range of computer security issues. It is intended to provide practical and thorough guidance in the quagmire of computers, technology, networks, and software. Among the major topics discussed are : company security policies, data preservation and protection, personnel management and security, legal and auditing planning and control, network security, internal and external systems, physical security procedures, hardware and software protection, contingency planning.
588 0 $aPrint version record.
504 $aIncludes bibliographical references and index.
546 $aEnglish.
650 0 $aComputer security.
650 0 $aComputer networks$xSecurity measures.
650 0 $aInternet$xSecurity measures.
650 0 $aComputer security$vHandbooks, manuals, etc.
650 0 $aData protection$vHandbooks, manuals, etc.
650 0 $aComputer networks$xSecurity measures$vHandbooks, manuals, etc.
650 2 $aComputer Security
650 6 $aSécurité informatique$vGuides, manuels, etc.
650 6 $aProtection de l'information (Informatique)$vGuides, manuels, etc.
650 6 $aRéseaux d'ordinateurs$xSécurité$xMesures$vGuides, manuels, etc.
650 6 $aSécurité informatique.
650 6 $aRéseaux d'ordinateurs$xSécurité$xMesures.
650 6 $aInternet$xSécurité$xMesures.
650 7 $aCOMPUTERS$xInternet$xSecurity.$2bisacsh
650 7 $aCOMPUTERS$xNetworking$xSecurity.$2bisacsh
650 7 $aCOMPUTERS$xSecurity$xGeneral.$2bisacsh
650 7 $aData protection.$2fast$0(OCoLC)fst00887958
650 7 $aComputer networks$xSecurity measures.$2fast$0(OCoLC)fst00872341
650 7 $aComputer security.$2fast$0(OCoLC)fst00872484
650 7 $aInternet$xSecurity measures.$2fast$0(OCoLC)fst01751426
650 7 $aEngineering & Applied Sciences.$2hilcc
650 7 $aComputer Science.$2hilcc
650 7 $aSEGURANÇA EM COMPUTADOR.$2larpcal
650 7 $aREDES DE COMPUTADORES.$2larpcal
655 0 $aElectronic books.
655 2 $aHandbook
655 4 $aElectronic books.
655 7 $aHandbooks and manuals.$2fast$0(OCoLC)fst01423877
655 7 $aHandbooks and manuals.$2lcgft
655 7 $aGuides et manuels.$2rvmgf
700 1 $aShim, Jae K.
700 1 $aQureshi, Anique A.
700 1 $aSiegel, Joel G.
776 08 $iPrint version:$aShim, Jae K.$tInternational handbook of computer security.$dChicago, Ill. : Glenlake Pub., ©2000$z0814405797
856 40 $uhttp://www.columbia.edu/cgi-bin/cul/resolve?clio15062505$zTaylor & Francis eBooks
852 8 $blweb$hEBOOKS