000 -LEADER |
fixed length control field |
01851cam a22003974a 4500 |
001 - CONTROL NUMBER |
control field |
13083029 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20150210141618.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
030205s2003 maua b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2003002450 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
1578517796 [hardbound] |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Transcribing agency |
DLC |
Modifying agency |
DLC |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Edition number |
21 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Parenty, Thomas J. |
245 10 - TITLE STATEMENT |
Title |
Digital defense : |
Remainder of title |
what you should know about protecting your company's assets / |
Statement of responsibility, etc |
Thomas J. Parenty |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Boston : |
Name of publisher, distributor, etc |
Harvard Business School Press, |
Date of publication, distribution, etc |
c2003 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxii, 163 pages : |
Other physical details |
illustration ; |
Dimensions |
24 cm. |
336 ## - CONTENT TYPE |
Source |
rdacontent |
Content type term |
text |
337 ## - MEDIA TYPE |
Source |
rdamedia |
Media type term |
unmediated |
338 ## - CARRIER TYPE |
Source |
rdacarrier |
Carrier type |
volume |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes appendix, bibliography (p. 151-155) and index |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Contents: 1 Identifying your information assets -- 2 Determining your current vulnerabilities -- 3 Protecting your computers -- 4 Developing a security process based on trust -- 5 Keeping information confidential -- 6 Establishing identity -- 7 Controlling access in the digital world -- 8 Knowing what's real in cyberspace -- 9 Putting your security process into action -- 10 Transforming your business through information security |
546 ## - LANGUAGE NOTE |
Language note |
English |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Business enterprises |
General subdivision |
Computer networks |
-- |
Security measures |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Electronic commerce |
General subdivision |
Security measures |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data protection |
856 41 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Table of contents |
Uniform Resource Identifier |
http://www.loc.gov/catdir/toc/fy044/2003002450.html |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
orignew |
d |
1 |
e |
ecip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Type of record |
Reference (MAIN) |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Encoded by |
kirsty[new] |
Date encoded |
10/29/2014 |