Southville International School and Colleges

Adaptive security management architecture / (Record no. 283649)

000 -LEADER
fixed length control field 01904cam a22003254a 4500
001 - CONTROL NUMBER
control field 16499268
003 - CONTROL NUMBER IDENTIFIER
control field PILC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20150228083723.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 101013s2011 flua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2010042148
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780849370526 (hardback)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0849370523 (hardback)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn671491692
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency YDX
-- YDXCP
-- DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK 5105.59
Item number .T553 2011
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 658.4/78
084 ## - OTHER CLASSIFICATION NUMBER
Classification number COM053000
-- COM032000
-- BUS073000
Source of number bisacsh
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Tiller, James S.
245 10 - TITLE STATEMENT
Title Adaptive security management architecture /
Statement of responsibility, etc James S. Tiller.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Boca Raton, FL :
Name of publisher, distributor, etc Auerbach Publications,
Date of publication, distribution, etc c2011.
300 ## - PHYSICAL DESCRIPTION
Extent xxiv, 458 pages :
Other physical details illustrations ;
Dimensions 25 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes an index.
520 ## - SUMMARY, ETC.
Summary, etc "To take the next step in information security, Adaptive Security Management Architecture provides a comprehensive approach to managing people, process, and technology through the sound application of metrics. This book demonstrates how to develop a balanced strategy for meeting security challenges and enhancing the business in addressing threats and compliance. Describing how the different facets of a secure IT system are related, it integrates IT security with business, using managerial measures of performance such as balanced scorecards and applying business risk analysis. The text also focuses on customer satisfaction to stress the importance of IT as a part of business rather than as a separate entity"--Provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Books
Holdings
Barcode Date acquired Date last seen Shelving location Current Location Withdrawn status Source of acquisition Source of classification or shelving scheme Price effective from Damaged status Koha item type Full call number Lost status Permanent Location
C191012015-02-282018-05-15General Circulation SectionCollege Library Library Fund 2015-02-28 BooksTK 5105.59 .T553 2011 College Library
Powered by Koha