รายละเอียดในรูปแบบ MARC
| 000 -LEADER |
| fixed length control field |
01789cam a2200301 i 4500 |
| 001 - CONTROL NUMBER |
| control field |
32352 |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20230423231423.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
140910s2014 ne a b 001 0 eng |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781597499699 (pbk.) |
| 049 ## - LOCAL HOLDINGS (OCLC) |
| -- |
PITLIB |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
TK5102.85 |
| Item number |
.S556 |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Shimeall, Timothy, |
| Relator term |
author |
| 9 (RLIN) |
41950 |
| 245 10 - TITLE STATEMENT |
| Title |
Introduction to information security : |
| Remainder of title |
a strategic-based approach / |
| Statement of responsibility, etc. |
Timothy J. Shimeall, Jonathan M. Spring |
| Medium |
[book] |
| 250 ## - EDITION STATEMENT |
| Edition statement |
First edition |
| 260 #1 - PUBLICATION, DISTRIBUTION, ETC. |
| Place of publication, distribution, etc. |
Boston : |
| -- |
Boston : |
| Name of publisher, distributor, etc. |
Syngress, an imprint of Elsevier, |
| Date of publication, distribution, etc. |
2014. |
| -- |
41949 |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xxi, 360 pages : |
| Other physical details |
illustrations |
| 449 #0 - |
| -- |
•u005– New Arrivals- Sep. 2014 |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc. note |
Includes bibliographical references and index |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
"The purpose of this book is primarily to develop a strategic method of thinking about information security. Chapters 1 and 2 motivate the strategic approach and define security-related terms. Chapters 3-15 are organized around a certain type of contribution to a strategic area. The four strategic stages developed are deception, frustration, resistance, and recognition/recovery. The chapter topics are summarized in Table I.1. As each strategy builds on the prior strategies, the most natural way for a reader interested in strategy to proceed is sequentially, perhaps skimming over some of the technical details" |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Telecommunication |
| General subdivision |
Security measures |
| 9 (RLIN) |
17923 |
| 650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer networks |
| General subdivision |
Security measures |
| 9 (RLIN) |
5919 |
| 650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer security |
| 9 (RLIN) |
23769 |
| 690 #0 - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) |
| Topical term or geographic name as entry element |
0023 วิศวกรรมศาสตรบัณฑิต สาขาวิศวกรรมคอมพิวเตอร์ CPE (ป.ตรี) |
| 9 (RLIN) |
65 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Spring, Jonathan M., |
| Relator term |
author |
| 9 (RLIN) |
41951 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Koha item type |
หนังสือ |
| 988 ## - |
| -- |
32352 |