Digital defense : (Record no. 1940)

000 -LEADER
fixed length control field 01851cam a22003974a 4500
001 - CONTROL NUMBER
control field 13083029
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20150210141618.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 030205s2003 maua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2003002450
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1578517796 [hardbound]
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 21
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Parenty, Thomas J.
245 10 - TITLE STATEMENT
Title Digital defense :
Remainder of title what you should know about protecting your company's assets /
Statement of responsibility, etc Thomas J. Parenty
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Boston :
Name of publisher, distributor, etc Harvard Business School Press,
Date of publication, distribution, etc c2003
300 ## - PHYSICAL DESCRIPTION
Extent xxii, 163 pages :
Other physical details illustration ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type volume
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes appendix, bibliography (p. 151-155) and index
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Contents: 1 Identifying your information assets -- 2 Determining your current vulnerabilities -- 3 Protecting your computers -- 4 Developing a security process based on trust -- 5 Keeping information confidential -- 6 Establishing identity -- 7 Controlling access in the digital world -- 8 Knowing what's real in cyberspace -- 9 Putting your security process into action -- 10 Transforming your business through information security
546 ## - LANGUAGE NOTE
Language note English
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Business enterprises
General subdivision Computer networks
-- Security measures
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Electronic commerce
General subdivision Security measures
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection
856 41 - ELECTRONIC LOCATION AND ACCESS
Materials specified Table of contents
Uniform Resource Identifier http://www.loc.gov/catdir/toc/fy044/2003002450.html
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Type of record Reference (MAIN)
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Encoded by kirsty[new]
Date encoded 10/29/2014
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Library Location Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type Other Library Location
          College Library   23/06/2006   658.478 P21 2003 3UCBL000002984 29/10/2014 29/10/2014 Book UCBL_MAIN

University of Cebu - Banilad | 6000, Gov. M. Cuenco Ave, Cebu City, 6000 Cebu, Philippines
Tel. 410 8822 local 7123| e-mail ucbaniladcampus.library@gmail.com

Powered by Koha