Engineering information security : (Record no. 246)

MARC details
000 -LEADER
fixed length control field 02554cam a22003614a 4500
001 - CONTROL NUMBER
control field 16313875
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250420134802.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field co |g|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100702s2011 njua 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2010028408
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119101604 (hardback)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn500823574
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency KCST
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number J325 2011
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition information 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Jacobs, Stuart.
9 (RLIN) 900
245 10 - TITLE STATEMENT
Title Engineering information security :
Remainder of title the application of systems engineering concepts to achieve information assurance /
Statement of responsibility, etc. Stuart Jacobs.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Hoboken, N.J. :
Name of publisher, distributor, etc. Wiley :
-- IEEE Press,
Date of publication, distribution, etc. c2016.
300 ## - PHYSICAL DESCRIPTION
Extent xxii, 751 p. :
Other physical details ill. ;
Dimensions 24 cm. +
490 1# - SERIES STATEMENT
Series statement IEEE Press series on information & communication networks security
500 ## - GENERAL NOTE
General note Includes index.
520 ## - SUMMARY, ETC.
Summary, etc. "Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society."--Provided by publisher.
520 ## - SUMMARY, ETC.
Summary, etc. "This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society"--Provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
9 (RLIN) 892
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
9 (RLIN) 464
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information technology
General subdivision Security measures.
9 (RLIN) 901
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection.
9 (RLIN) 902
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title IEEE Press series on information & communication networks security.
9 (RLIN) 903
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Book
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Cost, normal purchase price Total checkouts Full call number Barcode Date last seen Date last checked out Price effective from Koha item type
    Dewey Decimal Classification     KCST Library KCST Library 11/12/2019 39.56 1 005.8 Ja En 1000000712 04/02/2025 04/02/2025 11/12/2019 Book
© 2025 KCST. All rights reserved