|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBOOKCENTRAL_ocm62233748 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr nn||||||||| |
008 |
051107s2002 enka ob 000 0 eng d |
040 |
|
|
|a NTG
|b eng
|e pn
|c NTG
|d N$T
|d YDXCP
|d SFB
|d CAI
|d IDEBK
|d E7B
|d OCLCQ
|d B24X7
|d OCLCQ
|d OCLCF
|d OCLCO
|d OCLCQ
|d EBLCP
|d OCLCQ
|d AZK
|d LOA
|d CNNOR
|d CCO
|d MOR
|d PIFBR
|d ZCU
|d LIV
|d OCLCQ
|d MERUC
|d OCLCQ
|d U3W
|d OCLCA
|d STF
|d BRL
|d WRM
|d NRAMU
|d ICG
|d MOQ
|d INT
|d VT2
|d OCLCQ
|d COO
|d WYU
|d G3B
|d TKN
|d OCLCQ
|d DKC
|d AU@
|d OCLCQ
|d HS0
|d OCLCQ
|d BRF
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 60891229
|a 243495079
|a 243495080
|a 276796240
|a 647316693
|a 888659499
|a 961644915
|a 962682159
|a 1037466352
|
020 |
|
|
|a 1845446984
|q (electronic bk.)
|
020 |
|
|
|a 9781845446987
|q (electronic bk.)
|
020 |
|
|
|z 0861767705
|
029 |
1 |
|
|a AU@
|b 000050982974
|
029 |
1 |
|
|a AU@
|b 000053028000
|
029 |
1 |
|
|a AU@
|b 000053224725
|
029 |
1 |
|
|a AU@
|b 000053241247
|
029 |
1 |
|
|a AU@
|b 000066751960
|
029 |
1 |
|
|a DEBBG
|b BV044080828
|
035 |
|
|
|a (OCoLC)62233748
|z (OCoLC)60891229
|z (OCoLC)243495079
|z (OCoLC)243495080
|z (OCoLC)276796240
|z (OCoLC)647316693
|z (OCoLC)888659499
|z (OCoLC)961644915
|z (OCoLC)962682159
|z (OCoLC)1037466352
|
050 |
|
4 |
|a TK5105.875.I57
|b S64 2002b
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Special issue on internet security /
|c Guest editors, Matthew Warren, William Hutchinson and Gurpreet Dhillon.
|
260 |
|
|
|a Bradford, England :
|b Emerald Group Pub.,
|c ©2002.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
490 |
1 |
|
|a Logistics information management,
|x 0957-6053 ;
|v v. 15, no. 5/6
|
500 |
|
|
|a Title from title screen.
|
504 |
|
|
|a Includes bibliographical references.
|
505 |
0 |
0 |
|t An information security meta-policy for emergent organizations /
|r Richard Baskerville and Mikko Siponen --
|t Security practice : survey evidence from three countries /
|r M.J. Warren --
|t A prototype tool for information security awareness and training /
|r S.M. Furnell, M. Gennatou and P.S. Dowland --
|t Perceived information security, financial liability and consumer trust in electronic commerce transactions /
|r Ramnath K. Chellappa and Paul A. Pavlou --
|t Data protection and privacy : the Australian legislation and its implications for IT professionals /
|r W.G. (Bill) Hewett and J. Whitaker --
|t A security evaluation criteria /
|r W.J. Brooks, M.J. Warren and W. Hutchinson --
|t Challenges of implementing public key infrastructure in Netcentric enterprises /
|r Sunil Hazari --
|t Information security for agent-based WWW medical information retrieval /
|r Steven Walczak --
|t Computer viruses : a quantitative analysis /
|r A. Coulthard and T.A. Vuori --
|t Concepts in information warfare /
|r W. Hutchinson --
|t Securing information infrastructure from information warfare /
|r Sushil K. Sharma and Jatinder N.D. Gupta.
|
520 |
|
|
|a The fact that our lives are changing as a resultof the spread of technology is widelyaccepted. The nature of the ''society'' that willresult has been forecast by numerous authors(e.g. Martin, 1988; Toffler, 1981). Whilediffering in many respects, all share thecommon vision of the electronic computerand communications as the foundations onwhich society's critical infrastructure will bebuilt.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Internet
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Internet
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Internet
|x Security measures
|2 fast
|
700 |
1 |
|
|a Warren, Matt.
|
700 |
1 |
|
|a Hutchinson, William.
|
700 |
1 |
|
|a Dhillon, Gurpreet.
|
758 |
|
|
|i has work:
|a Special issue on internet security (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCY99XkYFxmRQMcxpxFyVvd
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
770 |
1 |
|
|a Logistics information management (Online)
|g Vol. 15, no. 5/6 (2002)
|
830 |
|
0 |
|a Logistics information management ;
|v v. 15, no. 5/6.
|x 0957-6053
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=232281
|z Texto completo
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00004897
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL232281
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10052662
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 135137
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 47948
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2909425
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2361092
|
994 |
|
|
|a 92
|b IZTAP
|