MARC details
000 -LEADER |
fixed length control field |
01877nam a2200229Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250520094758.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250520s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781902505909 |
040 ## - CATALOGING SOURCE |
Transcribing agency |
NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA 76.9.A5 .A44 2008 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Alexander, David |
Relator term |
author |
245 #0 - TITLE STATEMENT |
Title |
Information security management principles: |
Remainder of title |
an ISEB Certificate / |
Statement of responsibility, etc. |
Andy Taylor (editor), David Alexander, Amanda Finch and David Sutton |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Swindon, U.K. : |
Name of publisher, distributor, etc. |
British Computer Society, |
Date of publication, distribution, etc. |
c2008 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xix, 193 pages : |
Other physical details |
illustrations ; |
Dimensions |
25 cm. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Copyright; Contents; List of Figures and Tables; Authors; Acknowledgements; Abbreviations; Preface; 1 Information Security Principles; 2 Information Risk; 3 Information Security Framework; 4 Information Security Controls; Index; Back Cover |
520 ## - SUMMARY, ETC. |
Summary, etc. |
How safe is your information? Recent events show that commercial, personal and sensitive information is very hard to keep secure, and some estimates point to 2007 as being the worst year on record for data loss. As breaches in information security continue to make headline news, it is becoming increasingly clear that technological solutions are not the only answer. Research conducted in 2007 suggests that at least 80% of data leakages are caused by staff rather than IT systems (source: Financial Times/Forrester Research, Nov-07). It is clear therefore that Information Security should be viewed as a management function rather than one of IT alone. Here, the authors outline the main management principles designed to help you secure your data, and raise awareness of the issues involved. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
COMPUTER SECURITY -- MANAGEMENT EXAMINATIONS -- STUDY, GUIDES |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Taylor, Andy;Finch, Amanda;Sutton, David |
Relator term |
editor;co-author;co-author |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Books |