000 -LEADER |
fixed length control field |
01605cam a22003494a 4500 |
001 - CONTROL NUMBER |
control field |
u6052 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
SA-PMU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20210418123355.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
030205s2003 maua b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2003002450 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
Modifying agency |
BAKER |
-- |
BTCTA |
-- |
YDXCP |
-- |
LVB |
-- |
IG# |
-- |
OCLCQ |
-- |
TULIB |
-- |
BDX |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
1578517796 (alk. paper) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781578517794 (alk. paper) |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)51613917 |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
HD30.38 |
Item number |
.P37 2003 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
658.4/78 |
Edition number |
21 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Parenty, Thomas J. |
245 10 - TITLE STATEMENT |
Title |
Digital defense : |
Remainder of title |
what you should know about protecting your company's assets / |
Statement of responsibility, etc. |
Thomas J. Parenty. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Boston : |
Name of publisher, distributor, etc. |
Harvard Business School Press, |
Date of publication, distribution, etc. |
c2003. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxii, 163 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references (p. 151-155) and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Identifying your information assets -- Determining your current vulnerabilities -- Start by protecting your computers -- Developing a security process based on trust -- Keeping information confidential -- Establishing identity -- Controlling access in the digital world -- Knowing what's real in cyberspace -- Putting your security process into action -- Transforming your business through information security. |
596 ## - |
-- |
1 2 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Business enterprises |
General subdivision |
Computer networks |
-- |
Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Electronic commerce |
General subdivision |
Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Data protection. |
856 41 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Table of contents |
Uniform Resource Identifier |
<a href="http://catdir.loc.gov/catdir/toc/fy044/2003002450.html">http://catdir.loc.gov/catdir/toc/fy044/2003002450.html</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Books |
994 ## - |
-- |
Z0 |
-- |
SUPMU |