|
|
|
|
LEADER |
01895nam a2200421 a 4500 |
001 |
EBC339307 |
003 |
MiAaPQ |
005 |
20200520144314.0 |
006 |
m o d | |
007 |
cr cn||||||||| |
008 |
071025s2008 ctu s 001 0 eng d |
010 |
|
|
|z 2007043997
|
020 |
|
|
|z 9780313345586 (alk. paper)
|
020 |
|
|
|a 9780313345593 (electronic bk.)
|
035 |
|
|
|a (MiAaPQ)EBC339307
|
035 |
|
|
|a (Au-PeEL)EBL339307
|
035 |
|
|
|a (CaPaEBR)ebr10481060
|
035 |
|
|
|a (CaONFJC)MIL130177
|
035 |
|
|
|a (OCoLC)218464465
|
040 |
|
|
|a MiAaPQ
|c MiAaPQ
|d MiAaPQ
|
050 |
|
4 |
|a HF5548.37
|b .A44 2008
|
082 |
0 |
4 |
|a 005.8
|2 22
|
100 |
1 |
|
|a Alexander, Philip,
|d 1963-
|
245 |
1 |
0 |
|a Information security
|h [electronic resource] :
|b a manager's guide to thwarting data thieves and hackers /
|c Philip Alexander.
|
260 |
|
|
|a Westport, Conn. :
|b Praeger Security International,
|c 2008.
|
300 |
|
|
|a viii, 175 p.
|
490 |
1 |
|
|a PSI business security
|
500 |
|
|
|a Includes index.
|
505 |
0 |
|
|a Computer use and data security policies and standards -- Network/DMZ design -- Defense in depth -- Authentication and authorization -- Security and the mobile employee -- Business continuity planning -- Hackers, snoops, and viruses -- Personnel issues and hiring practices -- Contractual considerations -- Data privacy laws -- Overseas outsourcing.
|
533 |
|
|
|a Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
|
650 |
|
0 |
|a Business enterprises
|x Computer networks
|x Security measures.
|
650 |
|
0 |
|a Information technology
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data protection.
|
655 |
|
4 |
|a Electronic books.
|
710 |
2 |
|
|a ProQuest (Firm)
|
830 |
|
0 |
|a PSI business security.
|
856 |
4 |
0 |
|u https://ebookcentral.proquest.com/lib/matrademy/detail.action?docID=339307
|z Click to View
|