000 -LEADER |
fixed length control field |
02423 a2200193 4500 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0849374952 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780849374951 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
INF |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Tipton, Harold F. |
9 (RLIN) |
915 |
245 10 - TITLE STATEMENT |
Title |
Information security management handbook |
Statement of responsibility, etc. |
Harold F. Tipton |
250 ## - EDITION STATEMENT |
Edition statement |
6th ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc. |
Boca Raton |
Name of publisher, distributor, etc. |
CRC |
Date of publication, distribution, etc. |
2007 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
3231p. |
500 ## - GENERAL NOTE |
General note |
HB |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Never before have there been so many laws designed to keep corporations honest. New laws and regulations force companies to develop stronger ethics policies and the shareholders themselves are holding publicly traded companies accountable for their practices. Consumers are also concerned over the privacy of their personal information and current and emerging legislation is reflecting this trend. Under these conditions, it can be difficult to know where to turn for reliable, applicable advice. The sixth edition of the Information Security Management Handbook addresses up-to-date issues in this increasingly important area. It balances contemporary articles with relevant articles from past editions to bring you a well grounded view of the subject. The contributions cover questions important to those tasked with securing information assets including the appropriate deployment of valuable resources as well as dealing with legal compliance, investigations, and ethics. Promoting the view that the management ethics and values of an organization leads directly to its information security program and the technical, physical, and administrative controls to be implemented, the book explores topics such as risk assessments; metrics; security governance, architecture, and design; emerging threats; standards; and business continuity and disaster recovery. The text also discusses physical security including access control and cryptography, and a plethora of technology issues such as application controls, network security, virus controls, and hacking. US federal and state legislators continue to make certain that information security is a board-level conversation and the Information Security Management Handbook, Sixth Edition continues to ensure that there you have a clear understanding of the rules and regulations and an effective method for their implementation. |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security-Management-Handbooks, Manuals |
-- |
Data protection-Handbooks, Manuals |
9 (RLIN) |
9550 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Krause, Micki (ed.) |
9 (RLIN) |
9551 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Reference |