Information security policies and procedures : a practitioner's reference (Record no. 1361)

MARC details
000 -LEADER
fixed length control field 01613nam a22002177a 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20211224131033.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 211224b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0849319587
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780849319587
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number PEI
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Peltier, Thomas R.
245 ## - TITLE STATEMENT
Title Information security policies and procedures : a practitioner's reference
Statement of responsibility, etc. Thomas R Peltier
250 ## - EDITION STATEMENT
Edition statement 2nd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boca Raton, FL :
Name of publisher, distributor, etc. Auerbach Publications,
Date of publication, distribution, etc. ©2004.
300 ## - PHYSICAL DESCRIPTION
Page number xxiii, 384 pages :
Other physical details illustrations, map ;
Dimensions 25 cm
505 ## - FORMATTED CONTENTS NOTE
Title Why manage this process as a project? --<br/>
-- Planning and preparation --<br/>
-- Developing policies --<br/>
-- Asset classification policy --<br/>
-- Developing standards --<br/>
-- Developing procedures --<br/>
-- Creating a table of contents --<br/>
-- Understanding how to sell policies, standards, and procedures.
520 ## - SUMMARY, ETC.
Summary, etc. Information Security Policies and Procedures: A Practitioner's Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts: an overview of security policies and procedures and an information security reference guide. This volume points out how security documents and standards are key elements in the business process that should never be undertaken to satisfy a perceived audit or security requirement. Instead, policies, standards, and procedures should exist only to support business objectives or mission requirements; they are elements that aid in the execution of management policies.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Gratis, Gifts
952 ## - LOCATION AND ITEM INFORMATION (KOHA)
-- 4685
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Non-fiction IIITDM Kurnool IIITDM Kurnool General Stacks 24.12.2021   005.8 PEI G000343 24.12.2021 24.12.2021 Gratis, Gifts
LIBRARY HOURS
Mon - Sat : 9:00 AM - 5.30 PM
Library will remain closed on public holidays
Contact Us

Librarian
Central Libray
Indian Institute of Information Technology Design and Manufacturing Kurnool
Andhra Pradesh - 518 007

Library Email ID: library@iiitk.ac.in

Copyright @ Central Library | IIITDM Kurnool

Powered by Koha