Information security evaluation : : a holistic approach / / Igli Tashi and Solange Ghernaouti-Helie.

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Place / Publishing House:Lausanne, Switzerland : : EPFL,, [2011]
2011
Year of Publication:2011
Language:English
Series:Management of technology series
Online Access:
Physical Description:1 online resource (212 pages) :; illustrations.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 5001605622
ctrlnum (MiAaPQ)5001605622
(Au-PeEL)EBL1605622
(CaPaEBR)ebr10839552
(CaONFJC)MIL581452
(OCoLC)874163089
collection bib_alma
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01623nam a2200421 i 4500</leader><controlfield tag="001">5001605622</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">140227t20112011sz a ob 000 0 eng|d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781439879153</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781439879160</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)5001605622</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL1605622</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10839552</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL581452</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)874163089</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">T37 2011</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Tashi, Igli.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security evaluation :</subfield><subfield code="b">a holistic approach /</subfield><subfield code="c">Igli Tashi and Solange Ghernaouti-Helie.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Lausanne, Switzerland :</subfield><subfield code="b">EPFL,</subfield><subfield code="c">[2011]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (212 pages) :</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="440" ind1=" " ind2="0"><subfield code="a">Management of technology series</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (ebrary, viewed March 7, 2014).</subfield></datafield><datafield tag="590" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business intelligence.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Confidential business information.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ghernaouti-Helie, Solange.</subfield></datafield><datafield tag="797" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1605622</subfield><subfield code="z">Click to View</subfield></datafield></record></collection>
record_format marc
spelling Tashi, Igli.
Information security evaluation : a holistic approach / Igli Tashi and Solange Ghernaouti-Helie.
Lausanne, Switzerland : EPFL, [2011]
2011
1 online resource (212 pages) : illustrations.
text rdacontent
computer rdamedia
online resource rdacarrier
Management of technology series
Includes bibliographical references.
Description based on online resource; title from PDF title page (ebrary, viewed March 7, 2014).
Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
Business intelligence.
Confidential business information.
Electronic books.
Ghernaouti-Helie, Solange.
ProQuest (Firm)
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1605622 Click to View
language English
format eBook
author Tashi, Igli.
spellingShingle Tashi, Igli.
Information security evaluation : a holistic approach /
author_facet Tashi, Igli.
Ghernaouti-Helie, Solange.
author_variant i t it
author2 Ghernaouti-Helie, Solange.
author2_variant s g h sgh
author2_role TeilnehmendeR
author_sort Tashi, Igli.
title Information security evaluation : a holistic approach /
title_sub a holistic approach /
title_full Information security evaluation : a holistic approach / Igli Tashi and Solange Ghernaouti-Helie.
title_fullStr Information security evaluation : a holistic approach / Igli Tashi and Solange Ghernaouti-Helie.
title_full_unstemmed Information security evaluation : a holistic approach / Igli Tashi and Solange Ghernaouti-Helie.
title_auth Information security evaluation : a holistic approach /
title_new Information security evaluation :
title_sort information security evaluation : a holistic approach /
publisher EPFL,
publishDate 2011
physical 1 online resource (212 pages) : illustrations.
isbn 9781439879160
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276.9 A25 T37 42011
genre Electronic books.
genre_facet Electronic books.
url https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1605622
illustrated Illustrated
oclc_num 874163089
work_keys_str_mv AT tashiigli informationsecurityevaluationaholisticapproach
AT ghernaoutiheliesolange informationsecurityevaluationaholisticapproach
status_str n
ids_txt_mv (MiAaPQ)5001605622
(Au-PeEL)EBL1605622
(CaPaEBR)ebr10839552
(CaONFJC)MIL581452
(OCoLC)874163089
is_hierarchy_title Information security evaluation : a holistic approach /
author2_original_writing_str_mv noLinkedField
_version_ 1792330767091630081