|
|
|
|
LEADER |
02490nam a22004213i 4500 |
001 |
c3249efd-8748-4978-aa30-8e53b87995b0 |
005 |
20240324000000.0 |
008 |
240312s2008 xx o ||||0 eng d |
020 |
|
|
|a 9780313345593
|q (electronic bk.)
|
020 |
|
|
|z 9780313345586
|
035 |
|
|
|a (Au-PeEL)EBL339307
|
035 |
|
|
|a (CaONFJC)MIL130177
|
035 |
|
|
|a (CaPaEBR)ebr10481060
|
035 |
|
|
|a (EXLCZ)9917683334800041
|
035 |
|
|
|a (MiAaPQ)EBC339307
|
035 |
|
|
|a (OCoLC)218464465
|
040 |
|
|
|a MiAaPQ
|b eng
|e rda
|e pn
|c MiAaPQ
|d MiAaPQ
|
050 |
|
4 |
|a HF5548.37 -- .A44 2008eb
|
082 |
0 |
|
|a 005.8
|
100 |
1 |
|
|a Alexander, Philip
|
245 |
1 |
0 |
|a Information Security :
|b A Manager's Guide to Thwarting Data Thieves and Hackers
|
250 |
|
|
|a 1st ed
|
264 |
|
1 |
|a New York :
|b Bloomsbury Publishing USA,
|c 2008
|
264 |
|
4 |
|c ©2008
|
300 |
|
|
|a 1 online resource (187 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a PSI Business Security Series
|
505 |
0 |
|
|a COVER -- CONTENTS -- PREFACE: THE HEARTBREAK OF DATA LOSS -- ACKNOWLEDGMENTS -- CHAPTER 1: COMPUTER USE AND DATA SECURITY POLICIES AND STANDARDS -- CHAPTER 2: NETWORK/DMZ DESIGN -- CHAPTER 3: DEFENSE IN DEPTH -- CHAPTER 4: AUTHENTICATION AND AUTHORIZATION -- CHAPTER 5: SECURITY AND THE MOBILE EMPLOYEE -- CHAPTER 6: BUSINESS CONTINUITY PLANNING -- CHAPTER 7: HACKERS, SNOOPS, AND VIRUSES -- CHAPTER 8: PERSONNEL ISSUES AND HIRING PRACTICES -- CHAPTER 9: CONTRACTUAL CONSIDERATIONS -- CHAPTER 10: DATA PRIVACY LAWS -- CHAPTER 11: OVERSEAS OUTSOURCING -- APPENDIX A: THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC) -- APPENDIX B: RAINBOW SERIES -- APPENDIX C: THE INTERNATIONAL ORGANIZATION FOR STANDARDIZATION (ISO) -- GLOSSARY -- INDEX
|
588 |
|
|
|a Description based on publisher supplied metadata and other sources
|
650 |
|
0 |
|a Business enterprises -- Computer networks -- Security measures
|
650 |
|
0 |
|a Computer security
|
650 |
|
0 |
|a Data protection
|
650 |
|
0 |
|a Information technology -- Security measures
|
776 |
0 |
8 |
|i Print version:
|a Alexander, Philip
|t Information Security
|d New York : Bloomsbury Publishing USA,c2008
|z 9780313345586
|
830 |
|
0 |
|a PSI Business Security Series
|
999 |
1 |
0 |
|i c3249efd-8748-4978-aa30-8e53b87995b0
|l 9977918546003681
|s US-PU
|m information_securitymanagers_guide_to_thwarting_data_thieves_and_hacke_____2008____1__blooma________________________________________alexander__philip__________________e
|