MARC details
000 -LEADER |
fixed length control field |
03934cam a2200361 a 4500 |
001 - CONTROL NUMBER |
control field |
computersecurity00gall |
003 - CONTROL NUMBER IDENTIFIER |
control field |
CaSfIA |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230525155303.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr|||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
860718s1987 maua b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
86018867 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Transcribing agency |
DLC |
Modifying agency |
XDM |
-- |
BTCTA |
-- |
YDXCP |
-- |
CaSfIA |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0409900842 (pbk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780409900842 (pbk.) |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)14002093 |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
Item number |
C655 1987 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
19 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) |
OCLC library identifier |
YDXCP |
System control number |
368979 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) |
OCLC library identifier |
AU@ |
System control number |
000004681932 |
245 00 - TITLE STATEMENT |
Title |
Computer security : |
Medium |
[electronic resource] |
Remainder of title |
readings from Security management magazine / |
Statement of responsibility, etc. |
edited by Shari Mendelson Gallery. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Boston : |
Name of publisher, distributor, etc. |
Butterworths, |
Date of publication, distribution, etc. |
c1987. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xvi, 301 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographies and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Why haven't you done something about EDP security / Roger D. Wilson and Martin E. Silverman -- Before disaster strikes, fortify your computer / Henry M. Kluepfel -- Computer security belongs in the security department / Henry J. Beattie -- Are you computer wise / Frederick G. Tompkins -- The gap between computer people and security people / Dennis F. Poindexter -- Automated information systems: the same rules don't apply / James A. Schweitzer -- Judging your computer liability / Robert F. Johnson -- Put information assets on the balance sheet / Dr. Alan G. Merten, Patrice Delancy, Beth Poomerantz, and Paula Kelly -- The basics of EDP risk assessment / James R. Wade -- Computing security risk analysis: is it worth it / James A. Schweitzer -- The hidden risk in risk analysis / Howard R. Keough -- Selective protection / Frank T. Roedell -- Information security strategy / Donald J. Coppotelli -- Effictively securing business communications / James A. Schweitzer -- Protecting information outside the office / M. L. Proctor -- Don't forget to debrief / M. L. Proctor -- Data security--key to protecting your store's assets / Charles Jackson. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Who are the computer criminals / Jay Becker -- Computer abuse research update / Donn B. Parker -- Some basic bytes on keeping computer security thieves out of your system / Arion N. Pattakos -- Insurance against a data disaster / Bernard Balter -- Quick, efficient recovery of the DP function: a critical security responsibility / Michael Sobol -- How changes in computing practices affect security / James S. Schweitzer -- Will computer security keep pace / Carl R. Armstrong -- Remote controls for computer data: data processing firms offer security packages / Mary Alice Crawford -- Computational cryptography is an EDP security aid / William E. Perry and Herbert S. Bright -- Seven fallacies confuse computer fire safety / Robert V. Jacobson. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Security in the trenches / Charles H. Norris, jr. -- Scanning the site for computer installations / Richard H. Bessenhoffer -- Controlling physical access from a central location / Brian B. Austin -- What's new in computer security accessories / Sandy Evans -- Destruction of input and output materials / Megan Jaegerman -- Conservation and the destruction of classified waste material / Gerald A. Straccia -- How to select and implement a data security product / Robert E. Johnson -- A technical approach to computer access control / Eugene F. Troy, Stuart W. Katzke, and Dennis D. Steinauer -- A model for screening computer users / Charles Goodroe -- The role of the questioned document examiner in computer crime investigations / Dr. David A. Crown. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Electronic data processing departments |
General subdivision |
Security measures. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Gallery, Shari Mendelson. |
730 0# - ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Security management (Arlington, Va.) |
856 41 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="http://www.archive.org/details/computersecurity00gall">http://www.archive.org/details/computersecurity00gall</a> |
Public note |
Free eBook from the Internet Archive |
856 42 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="http://www.openlibrary.org/books/OL2725140M">http://www.openlibrary.org/books/OL2725140M</a> |
Public note |
Additional information and access via Open Library |