Information security management / (Record no. 4393)

000 -LEADER
fixed length control field 01769cam a2200337 i 4500
001 - CONTROL NUMBER
control field 21898892
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250210133307.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210209s2023 maua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2021006401
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781284211658
Qualifying information (paperback)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions rda
Transcribing agency DLC
Modifying agency DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HF5548.37.W67 2023
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 658.4/78
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Workman, Michael D.,
Dates associated with a name 1957-
Relator term author.
245 10 - TITLE STATEMENT
Title Information security management /
Statement of responsibility, etc Michael Workman, PhD.
250 ## - EDITION STATEMENT
Edition statement Second edition.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Burlington
Name of publisher, distributor, etc Jones & Bartlet Learning
Date of publication, distribution, etc 2023
300 ## - PHYSICAL DESCRIPTION
Extent xxiii, 442 pages :
Other physical details illustrations;
Dimensions 24 cm
500 ## - GENERAL NOTE
General note Revised edition of: Information security for managers.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc "This textbook provides an overview of information and cybersecurity and offers a summary of security topics that are addressed in more detail in the ISSA series. The text begins with foundational materials that cover the broad spectrum of information technology management. The text then focuses on specifics aspects of information security design, development, control, and governance. Finally, we delve into advanced research and development topics such as emerging threats, and what we are doing in the R&D field to try to address them"--
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Business enterprises
General subdivision Computer networks
-- Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
General subdivision Management.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection.
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Full call number Barcode Date last seen Copy number Price effective from Koha item type Total Checkouts
          Riara University Library Riara University Library General stack 10/02/2025 HF5548.37W67 2023 10776/25 10/02/2025 C.1 10/02/2025 Book  
          Riara University Library Riara University Library General stack 10/02/2025 HF5548.37W67 2023 10777/25 10/02/2025 C.2 10/02/2025 Book  

Riara University Library,
P.O. Box 49940-00100,
Nairobi, Kenya.