|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBOOKCENTRAL_ocn738439112 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
110705s2008 ctu ob 001 0 eng d |
010 |
|
|
|z 2007043997
|
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d VLB
|d CDX
|d E7B
|d IDEBK
|d OCLCQ
|d REDDC
|d OCLCQ
|d LUCPP
|d MHW
|d EBLCP
|d OCLCO
|d OCLCQ
|d OCLCF
|d DEBSZ
|d AX@
|d OCLCO
|d NLGGC
|d OCLCQ
|d YDXCP
|d OCLCQ
|d OCLCO
|d OCLCQ
|d MERUC
|d OCLCA
|d KIJ
|d CNNOR
|d CUY
|d LOA
|d ICG
|d COCUF
|d K6U
|d ZCU
|d STF
|d OCLCQ
|d WRM
|d VT2
|d U3W
|d D6H
|d OCLCQ
|d WYU
|d G3B
|d LVT
|d S8J
|d S9I
|d OCLCQ
|d DKC
|d OCLCQ
|d INARC
|d VLY
|d TEFOD
|d OCLCQ
|d SFB
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 218464465
|a 254159350
|a 422896496
|a 646740897
|a 815564161
|a 1030817780
|a 1033539281
|a 1162041559
|a 1194591406
|a 1290094254
|
020 |
|
|
|a 9780313345593
|q (electronic bk.)
|
020 |
|
|
|a 0313345597
|q (electronic bk.)
|
020 |
|
|
|a 1281301779
|
020 |
|
|
|a 9781281301772
|
020 |
|
|
|a 9786611301774
|
020 |
|
|
|a 6611301771
|
020 |
|
|
|z 9780313345586
|
020 |
|
|
|z 0313345589
|
029 |
1 |
|
|a AU@
|b 000051373125
|
029 |
1 |
|
|a CDX
|b 8377580
|
029 |
1 |
|
|a DEBSZ
|b 39617342X
|
029 |
1 |
|
|a DEBSZ
|b 422135240
|
035 |
|
|
|a (OCoLC)738439112
|z (OCoLC)218464465
|z (OCoLC)254159350
|z (OCoLC)422896496
|z (OCoLC)646740897
|z (OCoLC)815564161
|z (OCoLC)1030817780
|z (OCoLC)1033539281
|z (OCoLC)1162041559
|z (OCoLC)1194591406
|z (OCoLC)1290094254
|
037 |
|
|
|a C34558
|b Greenwood eBooks
|n http://www.ebooks.greenwood.com/about.asp
|
050 |
|
4 |
|a HF5548.37
|b .A44 2008eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a KMK
|2 bicssc
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Alexander, Philip,
|d 1963-
|1 https://id.oclc.org/worldcat/entity/E39PCjxqchBGrbfkpKR7XRwWtC
|
245 |
1 |
0 |
|a Information security :
|b a manager's guide to thwarting data thieves and hackers /
|c Philip Alexander.
|
260 |
|
|
|a Westport, Conn. :
|b Praeger Security International,
|c 2008.
|
300 |
|
|
|a 1 online resource (viii, 175 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a PSI business security
|
505 |
0 |
|
|a Computer use and data security policies and standards -- Network/DMZ design -- Defense in depth -- Authentication and authorization -- Security and the mobile employee -- Business continuity planning -- Hackers, snoops, and viruses -- Personnel issues and hiring practices -- Contractual considerations -- Data privacy laws -- Overseas outsourcing.
|
504 |
|
|
|a Includes bibliographical references.
|
520 |
|
|
|a In this book the author provides a broad guide to understanding data security, related technologies and what they can and cannot do, and other issues pertaining to protecting a company's vital and confidential information from loss or exposure. Topics include Defense in Depth (layered defense), security and mobile employees, personnel issues and hiring practices, overseas outsourcing, and hackers and viruses. This book is intended for non-technical executives responsible for maintaining information security.
|
588 |
0 |
|
|a Print version record.
|
546 |
|
|
|a English.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Business enterprises
|x Computer networks
|x Security measures.
|
650 |
|
0 |
|a Information technology
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Technologie de l'information
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Business enterprises
|x Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
650 |
|
7 |
|a Information technology
|x Security measures
|2 fast
|
758 |
|
|
|i has work:
|a Information security (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCFGWTrj6ghv9w9yVRWFD7b
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Alexander, Philip, 1963-
|t Information security.
|d Westport, Conn. : Praeger Security International, 2008
|z 9780313345586
|w (DLC) 2007043997
|w (OCoLC)177823714
|
830 |
|
0 |
|a PSI business security.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=339307
|z Texto completo
|
938 |
|
|
|a Internet Archive
|b INAR
|n informationsecur0000alex_u0j7
|
938 |
|
|
|a ABC-Clio
|b ABCC
|n ABC0313345597
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 8377580
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL339307
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10481060
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 225380
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 130177
|
938 |
|
|
|a Internet Archive
|b INAR
|n informationsecur0000alex
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2811342
|
994 |
|
|
|a 92
|b IZTAP
|