|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn892969495 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
141015s2014 enka ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d DEBBG
|d DEBSZ
|d OCLCQ
|d OCLCF
|d OCLCQ
|d UAB
|d LIV
|d OCLCQ
|d CEF
|d VT2
|d COO
|d OCLCQ
|d WYU
|d AU@
|d UKAHL
|d OCLCO
|d OCL
|d OCLCQ
|d INARC
|
020 |
|
|
|a 9781780172224
|
020 |
|
|
|a 1780172222
|
020 |
|
|
|a 1780172206
|
020 |
|
|
|a 9781780172200
|
020 |
|
|
|a 9781780172217
|q (PDF ebook)
|
020 |
|
|
|a 1780172214
|q (PDF ebook)
|
020 |
|
|
|a 9781780172231
|q (Kindle ebook)
|
020 |
|
|
|a 1780172230
|q (Kindle ebook)
|
020 |
|
|
|z 9781780172200
|
029 |
1 |
|
|a DEBBG
|b BV042182788
|
029 |
1 |
|
|a DEBSZ
|b 417234767
|
029 |
1 |
|
|a GBVCP
|b 882734490
|
035 |
|
|
|a (OCoLC)892969495
|
037 |
|
|
|a CL0500000489
|b Safari Books Online
|
050 |
|
4 |
|a HD30.2
|b .C655 2014
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Collins, J. D.
|q (Jon D.)
|
245 |
1 |
0 |
|a Security architect :
|b careers in IT service management /
|c Jon Collins.
|
260 |
|
|
|a Swidon, UK :
|b BCS Learning & Development,
|c ©2014.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
0 |
|
|a BCS guides to IT roles
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed October 1, 2014).
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a "Security architects are responsible for maintaining the security of an organisation's computer systems as well as designing, developing and reviewing security architectures that fit business requirements, mitigate risk and conform to security policies. They ensure that each unique set of security needs is addressed, that systems are protected and beneficial security change is implemented. The book provides practical, effective guidance for anyone looking to become a security architect or wanting to know more about what the role entails. It covers areas such as required skills, responsibilities, dependencies and career progression as well as relevant tools, standards and frameworks."--
|c Unedited summary from book
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Information technology.
|
650 |
|
0 |
|a Information technology
|x Management.
|
650 |
|
0 |
|a Computer network architectures.
|
650 |
|
0 |
|a Electronic data processing.
|
650 |
|
6 |
|a Technologie de l'information.
|
650 |
|
6 |
|a Technologie de l'information
|x Gestion.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Architectures.
|
650 |
|
7 |
|a information technology.
|2 aat
|
650 |
|
7 |
|a Electronic data processing.
|2 fast
|0 (OCoLC)fst00906956
|
650 |
|
7 |
|a Computer network architectures.
|2 fast
|0 (OCoLC)fst00872277
|
650 |
|
7 |
|a Information technology.
|2 fast
|0 (OCoLC)fst00973089
|
650 |
|
7 |
|a Information technology
|x Management.
|2 fast
|0 (OCoLC)fst00973112
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781780172200/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Internet Archive
|b INAR
|n securityarchitec0000coll
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26745130
|
994 |
|
|
|a 92
|b IZTAP
|