Computer security : (Record no. 24627)

MARC details
000 -LEADER
fixed length control field 03934cam a2200361 a 4500
001 - CONTROL NUMBER
control field computersecurity00gall
003 - CONTROL NUMBER IDENTIFIER
control field CaSfIA
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230525155303.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 860718s1987 maua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 86018867
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency XDM
-- BTCTA
-- YDXCP
-- CaSfIA
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0409900842 (pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780409900842 (pbk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)14002093
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number C655 1987
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 19
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier YDXCP
System control number 368979
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000004681932
245 00 - TITLE STATEMENT
Title Computer security :
Medium [electronic resource]
Remainder of title readings from Security management magazine /
Statement of responsibility, etc. edited by Shari Mendelson Gallery.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boston :
Name of publisher, distributor, etc. Butterworths,
Date of publication, distribution, etc. c1987.
300 ## - PHYSICAL DESCRIPTION
Extent xvi, 301 p. :
Other physical details ill. ;
Dimensions 24 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographies and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Why haven't you done something about EDP security / Roger D. Wilson and Martin E. Silverman -- Before disaster strikes, fortify your computer / Henry M. Kluepfel -- Computer security belongs in the security department / Henry J. Beattie -- Are you computer wise / Frederick G. Tompkins -- The gap between computer people and security people / Dennis F. Poindexter -- Automated information systems: the same rules don't apply / James A. Schweitzer -- Judging your computer liability / Robert F. Johnson -- Put information assets on the balance sheet / Dr. Alan G. Merten, Patrice Delancy, Beth Poomerantz, and Paula Kelly -- The basics of EDP risk assessment / James R. Wade -- Computing security risk analysis: is it worth it / James A. Schweitzer -- The hidden risk in risk analysis / Howard R. Keough -- Selective protection / Frank T. Roedell -- Information security strategy / Donald J. Coppotelli -- Effictively securing business communications / James A. Schweitzer -- Protecting information outside the office / M. L. Proctor -- Don't forget to debrief / M. L. Proctor -- Data security--key to protecting your store's assets / Charles Jackson.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Who are the computer criminals / Jay Becker -- Computer abuse research update / Donn B. Parker -- Some basic bytes on keeping computer security thieves out of your system / Arion N. Pattakos -- Insurance against a data disaster / Bernard Balter -- Quick, efficient recovery of the DP function: a critical security responsibility / Michael Sobol -- How changes in computing practices affect security / James S. Schweitzer -- Will computer security keep pace / Carl R. Armstrong -- Remote controls for computer data: data processing firms offer security packages / Mary Alice Crawford -- Computational cryptography is an EDP security aid / William E. Perry and Herbert S. Bright -- Seven fallacies confuse computer fire safety / Robert V. Jacobson.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Security in the trenches / Charles H. Norris, jr. -- Scanning the site for computer installations / Richard H. Bessenhoffer -- Controlling physical access from a central location / Brian B. Austin -- What's new in computer security accessories / Sandy Evans -- Destruction of input and output materials / Megan Jaegerman -- Conservation and the destruction of classified waste material / Gerald A. Straccia -- How to select and implement a data security product / Robert E. Johnson -- A technical approach to computer access control / Eugene F. Troy, Stuart W. Katzke, and Dennis D. Steinauer -- A model for screening computer users / Charles Goodroe -- The role of the questioned document examiner in computer crime investigations / Dr. David A. Crown.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Electronic data processing departments
General subdivision Security measures.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Gallery, Shari Mendelson.
730 0# - ADDED ENTRY--UNIFORM TITLE
Uniform title Security management (Arlington, Va.)
856 41 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://www.archive.org/details/computersecurity00gall">http://www.archive.org/details/computersecurity00gall</a>
Public note Free eBook from the Internet Archive
856 42 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://www.openlibrary.org/books/OL2725140M">http://www.openlibrary.org/books/OL2725140M</a>
Public note Additional information and access via Open Library
Holdings
Withdrawn status Lost status Damaged status Not for loan Collection Home library Current library Date acquired Total Checkouts Full call number Date last seen Price effective from Koha item type
        Project Gutenberg Main Library-Nabua Main Library-Nabua 05/25/2023   QA76.9.A25 C655 1987 05/25/2023 05/25/2023 EBooks