Cybersecurity for information professionals : (Record no. 195)

MARC details
000 -LEADER
fixed length control field 04036cam a2200445M 4500
001 - CONTROL NUMBER
control field 1157936176
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240819164227.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200613s2020 flua b 001 0 eng d
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBC071037
Source bnb
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0367506971
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780367506971
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780367486815
Qualifying information (hbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0367486814
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781000065824 (ePub ebook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781000065763 (PDF ebook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781000065794 (Mobipocket ebook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781003042235 (ebook)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1157936176
Canceled/invalid control number (OCoLC)1135203301
040 ## - CATALOGING SOURCE
Original cataloging agency YDX
Language of cataloging eng
Description conventions rda
Transcribing agency YDX
Modifying agency UKMGB
-- OCLCO
-- OCLCF
-- GZQ
-- OCLCO
-- CHVBK
-- OCLCO
-- OCL
-- OCLCO
-- WIT
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8 CHA 2020
Edition number 23
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) QA76.9.A25
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) C9344 2020
245 00 - TITLE STATEMENT
Title Cybersecurity for information professionals :
Remainder of title concepts and applications /
Statement of responsibility, etc. edited by Hsia-Ching Chang, Suliman Hawamdeh.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Boca Raton, FL :
Name of producer, publisher, distributor, manufacturer CRC Press,
Date of production, publication, distribution, manufacture, or copyright notice [2020]
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice ©2020
300 ## - PHYSICAL DESCRIPTION
Extent xix, 314 pages :
Other physical details illustrations (black and white) ;
Dimensions 24 cm
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
336 ## - CONTENT TYPE
Content type term still image
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Source rdacarrier
500 ## - GENERAL NOTE
General note "An Auebach Book".
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc. Information professionals have been paying more attention and putting a greater focus on privacy over cybersecurity. However, the number of both cybersecurity and privacy breach incidents are soaring, which indicates that cybersecurity risks are high and growing. Utilizing cybersecurity awareness training in organizations has been an effective tool to promote a cybersecurity-conscious culture, making individuals more cybersecurity-conscious as well. However, it is unknown if employees' security behavior at work can be extended to their security behavior at home and personal life. On the one hand, information professionals need to inherit their role as data and information gatekeepers to safeguard data and information assets. On the other hand, information professionals can aid in enabling effective information access and dissemination of cybersecurity knowledge to make users conscious about the cybersecurity and privacy risks that are often hidden in the cyber universe. Cybersecurity for Information Professionals: Concepts and Applications introduces fundamental concepts in cybersecurity and addresses some of the challenges faced by information professionals, librarians, archivists, record managers, students, and professionals in related disciplines. This book is written especially for educators preparing courses in information security, cybersecurity, and the integration of privacy and cybersecurity. The chapters contained in this book present multiple and diverse perspectives from professionals in the field of cybersecurity. They cover such topics as: Information governance and cybersecurity ; User privacy and security online and the role of information professionals ; Cybersecurity and social media ; Healthcare regulations, threats, and their impact on cybersecurity ; A socio-technical perspective on mobile cybersecurity ; Cybersecurity in the software development life cycle ; Data security and privacy. Above all, the book addresses the ongoing challenges of cybersecurity. In particular, it explains how information professionals can contribute to long-term workforce development by designing and leading cybersecurity awareness campaigns or cybersecurity hygiene programs to change people's security behavior.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
Authority record control number or standard number https://id.loc.gov/authorities/subjects/sh90001862
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes
General subdivision Prevention.
Authority record control number or standard number https://id.loc.gov/authorities/subjects/sh2008117723
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyber intelligence (Computer security)
Authority record control number or standard number https://id.loc.gov/authorities/subjects/sh2011005959
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Chang, Xiaqing,
Authority record control number or standard number https://id.loc.gov/authorities/names/nr89013911
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Hawamdeh, Suliman,
Dates associated with a name 1955-
Authority record control number or standard number https://id.loc.gov/authorities/names/nb2004007997
Relator term editor.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book
Suppress in OPAC No
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Total checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type Date due Date last checked out
    Dewey Decimal Classification     Symbiosis International University, Dubai Symbiosis International University, Dubai 09/08/2024   005.8 CHA 2020 SIU00101 09/08/2024 1 09/08/2024 Book    
    Dewey Decimal Classification     Symbiosis International University, Dubai Symbiosis International University, Dubai 19/08/2024 2 005.8 CHA 2020 SIU00102 25/04/2025 2 19/08/2024 Book 22/10/2025 25/04/2025
All Rights Reserved to Symbiosis International University, Dubai

Powered by Koha