Zen and the art of information security / (Record no. 684639)

MARC details
000 -LEADER
fixed length control field 06764cam a2200685 a 4500
001 - CONTROL NUMBER
control field ocn182560831
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240829154058.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu---unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 071128s2007 maua o 001 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency N$T
Language of cataloging eng
Description conventions pn
Transcribing agency N$T
Modifying agency YDXCP
-- OCLCQ
-- OSU
-- IDEBK
-- ZCU
-- E7B
-- OCLCQ
-- EBLCP
-- OCLCO
-- OCLCQ
-- OCLCF
-- OCLCQ
-- OPELS
-- NLGGC
-- OCLCO
-- DEBSZ
-- OCLCO
-- OCLCQ
-- OCLCO
-- UMI
-- OCLCQ
-- LOA
-- JBG
-- DEBBG
-- AGLDB
-- STF
-- MOR
-- PIFAG
-- MERUC
-- OCLCQ
-- OCLCA
-- U3W
-- OCLCA
-- WRM
-- D6H
-- OCLCQ
-- VTS
-- CEF
-- NRAMU
-- ICG
-- OCLCQ
-- INT
-- VT2
-- OCLCQ
-- WYU
-- OCLCQ
-- LEAUB
-- DKC
-- OCLCQ
-- M8D
-- HS0
-- OCLCQ
-- AJS
-- OCLCQ
-- OCLCO
-- ORMDA
-- OCLCO
-- OCLCQ
-- OCLCO
-- OCLCQ
-- OCLCO
019 ## -
-- 162131586
-- 226057215
-- 507796680
-- 647671171
-- 856952351
-- 931874013
-- 961626369
-- 962628145
-- 966265259
-- 984806093
-- 988445743
-- 992027739
-- 1037795572
-- 1038662246
-- 1045577622
-- 1055339382
-- 1065085487
-- 1081259508
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780080554747
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0080554741
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1597491683
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781597491686
035 ## - SYSTEM CONTROL NUMBER
System control number 212324
-- (N$T)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)182560831
Canceled/invalid control number (OCoLC)162131586
-- (OCoLC)226057215
-- (OCoLC)507796680
-- (OCoLC)647671171
-- (OCoLC)856952351
-- (OCoLC)931874013
-- (OCoLC)961626369
-- (OCoLC)962628145
-- (OCoLC)966265259
-- (OCoLC)984806093
-- (OCoLC)988445743
-- (OCoLC)992027739
-- (OCoLC)1037795572
-- (OCoLC)1038662246
-- (OCoLC)1045577622
-- (OCoLC)1055339382
-- (OCoLC)1065085487
-- (OCoLC)1081259508
037 ## - SOURCE OF ACQUISITION
Stock number 140931:141073
Source of stock number/acquisition Elsevier Science & Technology
Note http://www.sciencedirect.com
037 ## - SOURCE OF ACQUISITION
Stock number 9780080554747
Source of stock number/acquisition O'Reilly Media
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number W574 2007eb
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 060040
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 043050
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 053000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Winkler, Ira.
9 (RLIN) 116917
245 10 - TITLE STATEMENT
Title Zen and the art of information security /
Statement of responsibility, etc. Ira Winkler.
246 14 - VARYING FORM OF TITLE
Title proper/short title Ira Winkler's zen of security
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. Rockland, MA :
Name of publisher, distributor, etc. Syngress,
Date of publication, distribution, etc. ©2007.
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice ©2007
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (xvii, 158 pages) :
Other physical details illustrations
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
500 ## - GENERAL NOTE
General note Includes index.
588 0# - SOURCE OF DESCRIPTION NOTE
Source of description note Print version record.
520 ## - SUMMARY, ETC.
Summary, etc. While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable taking very simple actions to secure themselves. Even highly technical people have misperceptions about security concerns and will also benefit from Ira Winklers experiences making security understandable to the business world. Mr. Winkler is one of the most popular and highly rated speakers in the field of security, and lectures to tens of thousands of people a year. Zen and the Art of Information Security is based on one of his most well received international presentations. *Written by an internationally renowned author of "Spies Among Us" who travels the world making security presentations to tens of thousands of people a year * This short and concise book is specifically for the business, consumer, and technical user short on time but looking for the latest information along with reader friendly analogies * Describes the REAL security threats that you have to worry about, and more importantly, what to do about them
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Front Cover; Zen and the Art of Information Security; Copyright Page; Contents; Introduction; Why You Shouldn't Buy This Book; Chapter 1. Zen and the Art of Cybersecurity; Philosophy of Security; Chapter 2. Why l Don't Like the Title of This Book; What Makes a Scientist; Why Some People are Better Scientists; Putting it All Together; Applying Science; Chapter 3. What is Security?; Risk; What is a Security Program?; Optimizing Risk; Consciously Accept Risk; Chapter 4. A Bad Question; Value has Nothing to do With Computers; A Typical Security Budget; Determining A Security Budget
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Multiyear BudgetsRemind the CIO the I means Information; Making Risk a Conscious Decision; Chapter 5. What Makes a Master; Mastering Computer Security; Chapter 6. Knights and Dragons; The FUD Factor; Dragons Forgive Incompetency; Terrorists Really Aren't That Good; The People You Really Have to Worry About; Look for Snakes, Not Dragons; Don't Suffer Death By 1,000 Cuts; Chapter 7. Cyberterrorism is Not Effective; Anthrax vs. Nimda; It is Easier to Blow Things Up; What is a Terrorist?; Chapter 8. Common Sense and Common Knowledge; Wanting Benefit Without the Associated Costs
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Some People Are Just StupidThe Wizard of Oz; Chapter 9. Never Underestimate the Stupidity of a Criminal; There is a Difference Between Being Good and Being Effective; Understanding your Adversary; The Criminal Mindset; Your Kids are Notas Smart as You Think; Chapter 10. Information Security Is INFORMATION Security; Chapter 11. Is Security a Should or a Must?; Management Must Believe Security is a Must; So is Security a Should or a Must For You?; Chapter 12. If You Don't Remember History, You Will Repeat It; Chapter 13. Ira's Golden Rules; Take Responsibility; Decide Security is a Must
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Educate YourselfRemember, You are Protecting Information; Protecting Your Computer; Note on Security Software; The 95/5 Rule; Chapter 14. Chance Favors the Prepared; Ubiquitous Security; The Purpose of This Book; Technology is Still Important; Security is Really Risk Management; Be Responsible; Appendix A: Critical Moments in Computer Security History; Index; Syngress: The Definition of a Serious Security Library
590 ## - LOCAL NOTE (RLIN)
Local note Added to collection customer.56279.3
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
9 (RLIN) 2191
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes
General subdivision Prevention.
9 (RLIN) 4795
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Sécurité informatique.
9 (RLIN) 18600
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS
General subdivision Internet
-- Security.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS
General subdivision Networking
-- Security.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS
General subdivision Security
-- General.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes
General subdivision Prevention
Source of heading or term fast
9 (RLIN) 4795
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
Source of heading or term fast
9 (RLIN) 2191
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Winkler, Ira.
Title Zen and the art of information security.
Place, publisher, and date of publication Rockland, MA : Syngress, ©2007
International Standard Book Number 1597491683
-- 9781597491686
Record control number (DLC) 2007279019
-- (OCoLC)124040958
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified EBSCOhost
Uniform Resource Identifier <a href="https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=212324">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=212324</a>
938 ## -
-- EBL - Ebook Library
-- EBLB
-- EBL330200
938 ## -
-- ebrary
-- EBRY
-- ebr10196336
938 ## -
-- EBSCOhost
-- EBSC
-- 212324
938 ## -
-- YBP Library Services
-- YANK
-- 2739766
994 ## -
-- 92
-- N$T
Holdings
Withdrawn status Lost status Damaged status Not for loan Collection code Home library Current library Date acquired Total Checkouts Date last seen Price effective from Koha item type
  Not Lost     EBSCO Computers e-Library   29/08/2024   29/08/2024 29/08/2024 eBook

Powered by Koha