Cargando…

Introduction to information security : LiveLessons (Sneak Peek Video Training) /

"Information security directly impacts virtually every type of business. While related issues appear in the media more and more, it's typically in a fragmented fashion that really doesn't help give the people tasked with protecting organizational data and other assets a "big pict...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : Addison-Wesley Professional, 2015.
Colección:LiveLessons.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a2200000Ii 4500
001 OR_ocn903939117
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cna||||||||
007 vz czazuu
008 150224s2015 xx 231 o vleng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d OCLCA  |d OCLCO 
035 |a (OCoLC)903939117 
037 |a CL0500000557  |b Safari Books Online 
050 4 |a QA76.9.D314 
049 |a UAMI 
100 1 |a Aurnou, Scott,  |e on-screen presenter. 
245 1 0 |a Introduction to information security :  |b LiveLessons (Sneak Peek Video Training) /  |c Scott Aurnou. 
264 1 |a [Place of publication not identified] :  |b Addison-Wesley Professional,  |c 2015. 
300 |a 1 online resource (1 streaming video file (3 hr., 50 min., 42 sec.)) :  |b digital, sound, color. 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a LiveLessons 
500 |a Title and publication info taken from resource description page (viewed February 12, 2015). 
511 0 |a Presenter, Scott Aurnou. 
520 |a "Information security directly impacts virtually every type of business. While related issues appear in the media more and more, it's typically in a fragmented fashion that really doesn't help give the people tasked with protecting organizational data and other assets a "big picture" view of what the real threats and vulnerabilities are, or what steps should be taken to mitigate them. In this video training, Scott offers a relatively brief, coherent high-level overview of the various types of threats and what steps can and should be taken in response."--Resource description page. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Database security. 
650 0 |a Computer security. 
650 0 |a Data protection. 
650 2 |a Computer Security 
650 6 |a Bases de données  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 6 |a Protection de l'information (Informatique) 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
650 7 |a Database security.  |2 fast  |0 (OCoLC)fst00888063 
830 0 |a LiveLessons. 
856 4 0 |u https://learning.oreilly.com/videos/~/9780134135823/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP