|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-540-28104-7 |
003 |
DE-He213 |
005 |
20220126111009.0 |
007 |
cr nn 008mamaa |
008 |
100301s2006 gw | s |||| 0|eng d |
020 |
|
|
|a 9783540281047
|9 978-3-540-28104-7
|
024 |
7 |
|
|a 10.1007/3-540-28104-5
|2 doi
|
050 |
|
4 |
|a HF54.5-54.56
|
072 |
|
7 |
|a KJQ
|2 bicssc
|
072 |
|
7 |
|a UF
|2 bicssc
|
072 |
|
7 |
|a BUS083000
|2 bisacsh
|
072 |
|
7 |
|a KJQ
|2 thema
|
072 |
|
7 |
|a UF
|2 thema
|
082 |
0 |
4 |
|a 658.05
|2 23
|
100 |
1 |
|
|a Trcek, Denis.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Managing Information Systems Security and Privacy
|h [electronic resource] /
|c by Denis Trcek.
|
250 |
|
|
|a 1st ed. 2006.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2006.
|
300 |
|
|
|a XIII, 234 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a - The Scope of the Work and its Methodology -- Organization, Security and Privacy -- Security Technology: Concepts and Models -- Legal Aspects of ISs Security and Privacy -- Where Are We Headed?.
|
520 |
|
|
|a The book deals with the management of information systems security and privacy, based on a model that covers technological, organizational and legal views. This is the basis for a focused and methodologically structured approach that presents "the big picture" of information systems security and privacy, while targeting managers and technical profiles. The book addresses principles in the background, regardless of a particular technology or organization. It enables a reader to suit these principles to an organization's needs and to implement them accordingly by using explicit procedures from the book. Additionally, the content is aligned with relevant standards and the latest trends. Scientists from social and technical sciences are supposed to find a framework for further research in this broad area, characterized by a complex interplay between human factors and technical issues.
|
650 |
|
0 |
|a Business information services.
|
650 |
|
0 |
|a Business mathematics.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
|
0 |
|a Management.
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Information theory.
|
650 |
1 |
4 |
|a IT in Business.
|
650 |
2 |
4 |
|a Business Mathematics.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a IT Operations.
|
650 |
2 |
4 |
|a Management.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783540813743
|
776 |
0 |
8 |
|i Printed edition:
|z 9783540281030
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642421785
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/3-540-28104-5
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SBE
|
912 |
|
|
|a ZDB-2-SXBM
|
950 |
|
|
|a Business and Economics (SpringerNature-11643)
|
950 |
|
|
|a Business and Management (R0) (SpringerNature-43719)
|