<?xml version="1.0" encoding="UTF-8"?>
<mods xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" version="3.1" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-1.xsd">
  <titleInfo>
    <title>Principles of information security</title>
  </titleInfo>
  <name type="personal">
    <namePart>Whitman, Michael E.</namePart>
    <namePart type="date">1964-</namePart>
    <role>
      <roleTerm authority="marcrelator" type="text">creator</roleTerm>
    </role>
  </name>
  <name type="personal">
    <namePart>Mattord, Herbert J.</namePart>
  </name>
  <typeOfResource>text</typeOfResource>
  <originInfo>
    <place>
      <placeTerm type="code" authority="marccountry">mau</placeTerm>
    </place>
    <place>
      <placeTerm type="text">Boston, Mass</placeTerm>
    </place>
    <publisher>Thomson Course Technology</publisher>
    <dateIssued>2005</dateIssued>
    <edition>2nd ed.</edition>
    <issuance>monographic</issuance>
  </originInfo>
  <language>
    <languageTerm authority="iso639-2b" type="code">eng</languageTerm>
  </language>
  <physicalDescription>
    <form authority="marcform">print</form>
    <extent>576 p. : ill. ; 24 cm.</extent>
  </physicalDescription>
  <tableOfContents>Introduction to information security -- The need for security -- Legal, ethical, and professional issues in information security -- Risk management -- Planning for security -- Security technology: firewalls and VPNs -- Security technology: intrusion detection, access control, and other security tools -- Cryptography -- Physical security -- Implementing information security -- Security and personnel -- Information security maintenance.</tableOfContents>
  <targetAudience>IT</targetAudience>
  <note type="statement of responsibility">Michael E. Whitman, Herbert J. Mattord.</note>
  <note>Includes index.</note>
  <note>for circulation. 1 copy available in the collection </note>
  <subject authority="lcsh">
    <topic>Computer networks</topic>
    <topic>Security measures</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Computer security</topic>
  </subject>
  <subject authority="rvm">
    <topic>Systèmes informatiques</topic>
    <topic>Sécurité</topic>
    <topic>Mesures</topic>
  </subject>
  <subject authority="rvm">
    <topic>Technologie de l'information</topic>
    <topic>Sécurité</topic>
    <topic>Mesures</topic>
  </subject>
  <classification authority="lcc">TK 5105.59 .W54 2005</classification>
  <identifier type="isbn">0619216255</identifier>
  <identifier type="isbn">9780619216252</identifier>
  <identifier type="lccn">2007297587</identifier>
  <identifier type="uri">http://www.loc.gov/catdir/enhancements/fy1103/2007297587-b.html</identifier>
  <identifier type="uri">http://www.loc.gov/catdir/enhancements/fy1103/2007297587-d.html</identifier>
  <identifier type="uri">http://www.loc.gov/catdir/enhancements/fy1103/2007297587-t.html</identifier>
  <location>
    <url displayLabel="Contributor biographical information">http://www.loc.gov/catdir/enhancements/fy1103/2007297587-b.html</url>
  </location>
  <location>
    <url displayLabel="Publisher description">http://www.loc.gov/catdir/enhancements/fy1103/2007297587-d.html</url>
  </location>
  <location>
    <url displayLabel="Table of contents only">http://www.loc.gov/catdir/enhancements/fy1103/2007297587-t.html</url>
  </location>
  <recordInfo>
    <recordContentSource authority="marcorg">VZU</recordContentSource>
    <recordCreationDate encoding="marc">070710</recordCreationDate>
    <recordChangeDate encoding="iso8601">20140310182733.0</recordChangeDate>
    <recordIdentifier source="OSt">14921972</recordIdentifier>
  </recordInfo>
</mods>
