|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
JSTOR_on1121159280 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
190930s2019 xx o 000 0 eng d |
040 |
|
|
|a YDX
|b eng
|e pn
|c YDX
|d JSTOR
|d OCLCF
|d OCLCQ
|d N$T
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 1787781690
|q (electronic bk.)
|
020 |
|
|
|a 9781787781696
|q (electronic bk.)
|
020 |
|
|
|a 9781787781719
|q (electronic bk.)
|
020 |
|
|
|a 1787781712
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000066167898
|
029 |
1 |
|
|a AU@
|b 000067042864
|
035 |
|
|
|a (OCoLC)1121159280
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a ALAN CALDER.
|
245 |
1 |
0 |
|a ISO/IEC 38500 :
|b a pocket guide.
|
250 |
|
|
|a Second edition.
|
260 |
|
|
|a [Place of publication not identified] :
|b IT GOVERNANCE Publishing,
|c 2019.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
650 |
|
0 |
|a Computer security
|x Standards.
|
650 |
|
6 |
|a Sécurité informatique
|x Normes.
|
650 |
|
7 |
|a Computer security
|x Standards
|2 fast
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctvpb3xwt
|z Texto completo
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2258346
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 300847725
|
994 |
|
|
|a 92
|b IZTAP
|