|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
OR_ocn946889720 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr mn||||||||| |
008 |
160312t20162016enka ob 001 0 eng d |
040 |
|
|
|a B24X7
|b eng
|e rda
|e pn
|c B24X7
|d OCLCO
|d OCLCF
|d UMI
|d TOH
|d STF
|d DEBBG
|d OCLCQ
|d DEBSZ
|d OCLCA
|d CEF
|d AU@
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 961332259
|
020 |
|
|
|a 9780128023792
|
020 |
|
|
|a 0128023791
|
020 |
|
|
|z 9780128021903
|
020 |
|
|
|a 012802190X
|
020 |
|
|
|a 9780128021903
|
029 |
1 |
|
|a DEBBG
|b BV043969874
|
029 |
1 |
|
|a DEBSZ
|b 485804042
|
029 |
1 |
|
|a GBVCP
|b 882758403
|
035 |
|
|
|a (OCoLC)946889720
|z (OCoLC)961332259
|
037 |
|
|
|a CL0500000797
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|b K68 2016eb
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Kovacich, Gerald L.,
|e author.
|
245 |
1 |
4 |
|a The information systems security officer's guide :
|b establishing and managing a cyber security program /
|c Dr. Gerald L. Kovacich.
|
250 |
|
|
|a Third edition.
|
264 |
|
4 |
|c ©2016
|
264 |
|
1 |
|a Kidlington, Oxford, UK :
|b Butterworth-Heinemann is an imprint of Elsevier,
|c [2016]
|
300 |
|
|
|a 1 online resource :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title screen (Books24x7.com, viewed March 12, 2016).
|
520 |
|
|
|a This edition provides users with information on how to combat the ever-changing myriad of threats security professionals face. It presents practical advice on establishing, managing, and evaluating a successful information protection program in a corporation or government agency, covering everything from effective communication to career guidance for the information security officer. It outlines how to implement a new plan or evaluate an existing one, and is especially targeted to those who are new to the topic. Updated chapters reflect the latest technological changes and advances in countering the latest information security threats and risks and how they relate to corporate security and crime investigation. Topics, such as forensics labs and information warfare, as well as how to liaison with attorneys, law enforcement, and other agencies outside the organization are included. --
|c Edited summary from book.
|
504 |
|
|
|a Includes bibliographical references and index.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780128023792/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00111982
|
994 |
|
|
|a 92
|b IZTAP
|