|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBSCO_ocn689996262 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
101206s2007 xx o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d OCLCQ
|d N$T
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCF
|d DEBSZ
|d OCLCQ
|d E7B
|d YDXCP
|d OCLCQ
|d OCLCA
|d VTS
|d AGLDB
|d STF
|d M8D
|d OCLCQ
|d UKSSU
|d VLY
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1162441534
|a 1241762026
|
020 |
|
|
|a 9780398085353
|q (electronic bk.)
|
020 |
|
|
|a 0398085358
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000048806181
|
029 |
1 |
|
|a AU@
|b 000051544451
|
029 |
1 |
|
|a DEBBG
|b BV043034895
|
029 |
1 |
|
|a DEBSZ
|b 39640734X
|
029 |
1 |
|
|a DEBSZ
|b 42142995X
|
035 |
|
|
|a (OCoLC)689996262
|z (OCoLC)1162441534
|z (OCoLC)1241762026
|
050 |
|
4 |
|a QA76.9.A25
|b M457 2007
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Mendell, Ronald L.
|
245 |
1 |
0 |
|a Document Security :
|b Protecting Physical and Electronic Content.
|
260 |
|
|
|a Springfield :
|b Charles C Thomas Publisher, LTD,
|c 2007.
|
300 |
|
|
|a 1 online resource (181 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a DOCUMENT SECURITY; CONTENTS; Chapter 1: METADATA; Chapter 2: WEB-FACING DOCUMENTS; Chapter 3: INFORMATION LEAKAGE INBUSINESS CHANNELS; Chapter 4: DIGITAL DEVICE THEFT; Chapter 5: MAGNETIC, ELECTRONIC, AND OPTICAL PERSISTENCE; Chapter 6: SECURING PAPER AND PHYSICAL DOCUMENTS; Chapter 7: FORENSICS; Chapter 8: ANTI-FORENSICS; Chapter 9: EVALUATING WEB PAGES; Chapter 10: DOCUMENT FORGERY; Appendix; INDEX.
|
520 |
|
|
|a This text identifies common pitfalls in document security and suggests remedies to prevent its occurrence. It strives to alert an audience of managers, security professionals, and workers who come in regular contact with sensitive information. Recognition of how sensitive documents can violate the principle of confidentiality is the primary focus of the book. Chapter 1 discusses metadata in documents. Paying attention to this issue can reduce unintentional release of sensitive information. Chapter 2 explores Web-facing documents and how search engines like Google can uncover sensitive data in.
|
588 |
0 |
|
|a Print version record.
|
546 |
|
|
|a English.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Engineering & Applied Sciences.
|2 hilcc
|
650 |
|
7 |
|a Computer Science.
|2 hilcc
|
776 |
0 |
8 |
|i Print version:
|a Mendell, Ronald L.
|t Document Security : Protecting Physical and Electronic Content.
|d Springfield : Charles C Thomas Publisher, LTD, ©2007
|z 9780398077662
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=446143
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL556268
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr11044250
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 446143
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3543302
|
994 |
|
|
|a 92
|b IZTAP
|