Information security evaluation : : a holistic approach / / Igli Tashi and Solange Ghernaouti-Helie.
Saved in:
: | |
---|---|
TeilnehmendeR: | |
Place / Publishing House: | Lausanne, Switzerland : : EPFL,, [2011] 2011 |
Year of Publication: | 2011 |
Language: | English |
Series: | Management of technology series
|
Online Access: | |
Physical Description: | 1 online resource (212 pages) :; illustrations. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
5001605622 |
---|---|
ctrlnum |
(MiAaPQ)5001605622 (Au-PeEL)EBL1605622 (CaPaEBR)ebr10839552 (CaONFJC)MIL581452 (OCoLC)874163089 |
collection |
bib_alma |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01623nam a2200421 i 4500</leader><controlfield tag="001">5001605622</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">140227t20112011sz a ob 000 0 eng|d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781439879153</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781439879160</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)5001605622</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL1605622</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10839552</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL581452</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)874163089</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">T37 2011</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Tashi, Igli.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security evaluation :</subfield><subfield code="b">a holistic approach /</subfield><subfield code="c">Igli Tashi and Solange Ghernaouti-Helie.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Lausanne, Switzerland :</subfield><subfield code="b">EPFL,</subfield><subfield code="c">[2011]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (212 pages) :</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="440" ind1=" " ind2="0"><subfield code="a">Management of technology series</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (ebrary, viewed March 7, 2014).</subfield></datafield><datafield tag="590" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business intelligence.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Confidential business information.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ghernaouti-Helie, Solange.</subfield></datafield><datafield tag="797" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1605622</subfield><subfield code="z">Click to View</subfield></datafield></record></collection> |
record_format |
marc |
spelling |
Tashi, Igli. Information security evaluation : a holistic approach / Igli Tashi and Solange Ghernaouti-Helie. Lausanne, Switzerland : EPFL, [2011] 2011 1 online resource (212 pages) : illustrations. text rdacontent computer rdamedia online resource rdacarrier Management of technology series Includes bibliographical references. Description based on online resource; title from PDF title page (ebrary, viewed March 7, 2014). Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. Business intelligence. Confidential business information. Electronic books. Ghernaouti-Helie, Solange. ProQuest (Firm) https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1605622 Click to View |
language |
English |
format |
eBook |
author |
Tashi, Igli. |
spellingShingle |
Tashi, Igli. Information security evaluation : a holistic approach / |
author_facet |
Tashi, Igli. Ghernaouti-Helie, Solange. |
author_variant |
i t it |
author2 |
Ghernaouti-Helie, Solange. |
author2_variant |
s g h sgh |
author2_role |
TeilnehmendeR |
author_sort |
Tashi, Igli. |
title |
Information security evaluation : a holistic approach / |
title_sub |
a holistic approach / |
title_full |
Information security evaluation : a holistic approach / Igli Tashi and Solange Ghernaouti-Helie. |
title_fullStr |
Information security evaluation : a holistic approach / Igli Tashi and Solange Ghernaouti-Helie. |
title_full_unstemmed |
Information security evaluation : a holistic approach / Igli Tashi and Solange Ghernaouti-Helie. |
title_auth |
Information security evaluation : a holistic approach / |
title_new |
Information security evaluation : |
title_sort |
information security evaluation : a holistic approach / |
publisher |
EPFL, |
publishDate |
2011 |
physical |
1 online resource (212 pages) : illustrations. |
isbn |
9781439879160 |
callnumber-first |
Q - Science |
callnumber-subject |
QA - Mathematics |
callnumber-label |
QA76 |
callnumber-sort |
QA 276.9 A25 T37 42011 |
genre |
Electronic books. |
genre_facet |
Electronic books. |
url |
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1605622 |
illustrated |
Illustrated |
oclc_num |
874163089 |
work_keys_str_mv |
AT tashiigli informationsecurityevaluationaholisticapproach AT ghernaoutiheliesolange informationsecurityevaluationaholisticapproach |
status_str |
n |
ids_txt_mv |
(MiAaPQ)5001605622 (Au-PeEL)EBL1605622 (CaPaEBR)ebr10839552 (CaONFJC)MIL581452 (OCoLC)874163089 |
is_hierarchy_title |
Information security evaluation : a holistic approach / |
author2_original_writing_str_mv |
noLinkedField |
_version_ |
1792330767091630081 |