Infosec strategies and best practices : (Record no. 21982)

MARC details
000 -LEADER
fixed length control field 01640nam a2200229Ia 4500
003 - CONTROL NUMBER IDENTIFIER
control field NULRC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250520103033.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250520s9999 xx 000 0 und d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781800566364
040 ## - CATALOGING SOURCE
Transcribing agency NULRC
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK 5105.59 .M33 2021
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name MacMillan, Joseph
Relator term author
245 #0 - TITLE STATEMENT
Title Infosec strategies and best practices :
Remainder of title gain proficiency in information security using expert-level strategies and best practices /
Statement of responsibility, etc. Joseph MacMillan
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Birmingham, UK :
Name of publisher, distributor, etc. Packt Publishing, Limited,
Date of publication, distribution, etc. c2021
300 ## - PHYSICAL DESCRIPTION
Extent 254 pages ;
Dimensions 24 cm.
365 ## - TRADE PRICE
Price amount USD42
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Section 1. Information Security Risk Management and Governance -- Section 2. Closing the Gap: How to Protect the Organization -- Section 3. Operationalizing Information Security.
520 ## - SUMMARY, ETC.
Summary, etc. The book starts by helping you to understand the core principles of information security, why risk management is important, and how you can drive information security governance. You'll then explore methods for implementing security controls to achieve the organization's information security goals. As you make progress, you'll get to grips with design principles that can be utilized along with methods to assess and mitigate architectural vulnerabilities. The book will also help you to discover best practices for designing secure network architectures and controlling and managing third-party identity services. Finally, you will learn about designing and managing security testing processes, along with ways in which you can improve software security.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTER SECURITY
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Total checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Library of Congress Classification     Digital Forensic LRC - Main National University - Manila General Circulation 06/08/2024 Purchased - Amazon 42.00   GC TK 5105.59 .M33 2021 NULIB000019741 05/20/2025 c.1 05/20/2025 Books