000 -LEADER |
fixed length control field |
01904cam a22003254a 4500 |
001 - CONTROL NUMBER |
control field |
16499268 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
PILC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20150228083723.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
101013s2011 flua b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2010042148 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780849370526 (hardback) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0849370523 (hardback) |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)ocn671491692 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Transcribing agency |
DLC |
Modifying agency |
YDX |
-- |
YDXCP |
-- |
DLC |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK 5105.59 |
Item number |
.T553 2011 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
658.4/78 |
084 ## - OTHER CLASSIFICATION NUMBER |
Classification number |
COM053000 |
-- |
COM032000 |
-- |
BUS073000 |
Source of number |
bisacsh |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Tiller, James S. |
245 10 - TITLE STATEMENT |
Title |
Adaptive security management architecture / |
Statement of responsibility, etc |
James S. Tiller. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Boca Raton, FL : |
Name of publisher, distributor, etc |
Auerbach Publications, |
Date of publication, distribution, etc |
c2011. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxiv, 458 pages : |
Other physical details |
illustrations ; |
Dimensions |
25 cm. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes an index. |
520 ## - SUMMARY, ETC. |
Summary, etc |
"To take the next step in information security, Adaptive Security Management Architecture provides a comprehensive approach to managing people, process, and technology through the sound application of metrics. This book demonstrates how to develop a balanced strategy for meeting security challenges and enhancing the business in addressing threats and compliance. Describing how the different facets of a secure IT system are related, it integrates IT security with business, using managerial measures of performance such as balanced scorecards and applying business risk analysis. The text also focuses on customer satisfaction to stress the importance of IT as a part of business rather than as a separate entity"--Provided by publisher. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures. |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
orignew |
d |
1 |
e |
ecip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
Books |