The basics of information security : (Record no. 440143)

MARC details
000 -LEADER
fixed length control field 02034cam a2200337 i 4500
001 - CONTROL NUMBER
control field 18082271
003 - CONTROL NUMBER IDENTIFIER
control field KE-NaHC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20251112170125.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140326s2014 ne 000 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2014006770
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780128007440 (paperback)
035 ## - SYSTEM CONTROL NUMBER
System control number 18082271
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Description conventions rda
Modifying agency DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number A5453 2014
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Andress, Jason,
Relator term author
9 (RLIN) 143922
245 14 - TITLE STATEMENT
Title The basics of information security :
Remainder of title understanding the fundamentals of InfoSec in theory and practice /
Statement of responsibility, etc Jason Andress, Steven Winterfeld, technical editor.
250 ## - EDITION STATEMENT
Edition statement Second edition.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Waltham :
Name of publisher, distributor, etc Syngress,
Date of publication, distribution, etc 2014.
300 ## - PHYSICAL DESCRIPTION
Extent xxi, 217 pages ;
Dimensions 24 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc "The Basics of Information Security will provide the reader with a basic knowledge of information security in both theoretical and practical aspects. We will first cover the basic knowledge needed to understand the key concepts of information security, discussing many of the concepts that underpin the security world. We will then dive into practical applications of these ideas in the areas of operations, physical, network, operating system, and application security. Book Audience This book will provide a valuable resource to beginning security professionals, as well as to network and systems administrators. The information provided on can be used develop a better understanding on how we protect our information assets and defend against attacks, as well as how to apply these concepts practically"--
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
9 (RLIN) 143923
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
9 (RLIN) 58753
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information resources management.
9 (RLIN) 143924
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Winterfeld, Steven,
Relator term technical editor
9 (RLIN) 143925
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Koha issues (borrowed), all copies 1
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Date checked out Price effective from Koha item type Public note
    Library of Congress Classification     QA
Mathematics
JST Library JST Library General Stacks 15/10/2025 1 QA 76.9.A25 AND 115268 12/11/2025 12/11/2025 15/10/2025 Books Donation for MSD