Insider threat : protecting the enterprise from sabotage, spying, and theft / / Eric Cole, Sandra Ring.
Saved in:
: | |
---|---|
TeilnehmendeR: | |
Year of Publication: | 2006 |
Language: | English |
Online Access: | |
Physical Description: | xxv, 397 p. :; ill. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
500254849 |
---|---|
ctrlnum |
(MiAaPQ)500254849 (Au-PeEL)EBL254849 (CaPaEBR)ebr10110277 (CaONFJC)MIL103566 (OCoLC)935230517 |
collection |
bib_alma |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01428nam a2200385Ia 4500</leader><controlfield tag="001">500254849</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">051029s2006 maua sb 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780080489056</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1597490482 (pbk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)500254849</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL254849</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10110277</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL103566</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)935230517</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.C65 2006</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cole, Eric.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Insider threat</subfield><subfield code="h">[electronic resource] :</subfield><subfield code="b">protecting the enterprise from sabotage, spying, and theft /</subfield><subfield code="c">Eric Cole, Sandra Ring.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, Mass. :</subfield><subfield code="b">Syngress ;</subfield><subfield code="a">[S.l.] :</subfield><subfield code="b">Distributed by O'Reilly Media,</subfield><subfield code="c">2006.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxv, 397 p. :</subfield><subfield code="b">ill.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Commercial crimes.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer hackers.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ring, Sandra.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=254849</subfield><subfield code="z">Click to View</subfield></datafield></record></collection> |
record_format |
marc |
spelling |
Cole, Eric. Insider threat [electronic resource] : protecting the enterprise from sabotage, spying, and theft / Eric Cole, Sandra Ring. Rockland, Mass. : Syngress ; [S.l.] : Distributed by O'Reilly Media, 2006. xxv, 397 p. : ill. Includes bibliographical references and index. Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. Commercial crimes. Computer hackers. Computer networks Security measures. Computer security. Electronic books. Ring, Sandra. ProQuest (Firm) https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=254849 Click to View |
language |
English |
format |
Electronic eBook |
author |
Cole, Eric. |
spellingShingle |
Cole, Eric. Insider threat protecting the enterprise from sabotage, spying, and theft / |
author_facet |
Cole, Eric. Ring, Sandra. ProQuest (Firm) ProQuest (Firm) |
author_variant |
e c ec |
author2 |
Ring, Sandra. ProQuest (Firm) |
author2_variant |
s r sr |
author2_role |
TeilnehmendeR TeilnehmendeR |
author_corporate |
ProQuest (Firm) |
author_sort |
Cole, Eric. |
title |
Insider threat protecting the enterprise from sabotage, spying, and theft / |
title_sub |
protecting the enterprise from sabotage, spying, and theft / |
title_full |
Insider threat [electronic resource] : protecting the enterprise from sabotage, spying, and theft / Eric Cole, Sandra Ring. |
title_fullStr |
Insider threat [electronic resource] : protecting the enterprise from sabotage, spying, and theft / Eric Cole, Sandra Ring. |
title_full_unstemmed |
Insider threat [electronic resource] : protecting the enterprise from sabotage, spying, and theft / Eric Cole, Sandra Ring. |
title_auth |
Insider threat protecting the enterprise from sabotage, spying, and theft / |
title_new |
Insider threat |
title_sort |
insider threat protecting the enterprise from sabotage, spying, and theft / |
publisher |
Syngress ; Distributed by O'Reilly Media, |
publishDate |
2006 |
physical |
xxv, 397 p. : ill. |
callnumber-first |
T - Technology |
callnumber-subject |
TK - Electrical and Nuclear Engineering |
callnumber-label |
TK5105 |
callnumber-sort |
TK 45105.59 C65 42006 |
genre |
Electronic books. |
genre_facet |
Electronic books. |
url |
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=254849 |
illustrated |
Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
005 - Computer programming, programs & data |
dewey-full |
005.8 |
dewey-sort |
15.8 |
dewey-raw |
005.8 |
dewey-search |
005.8 |
oclc_num |
935230517 |
work_keys_str_mv |
AT coleeric insiderthreatprotectingtheenterprisefromsabotagespyingandtheft AT ringsandra insiderthreatprotectingtheenterprisefromsabotagespyingandtheft AT proquestfirm insiderthreatprotectingtheenterprisefromsabotagespyingandtheft |
status_str |
n |
ids_txt_mv |
(MiAaPQ)500254849 (Au-PeEL)EBL254849 (CaPaEBR)ebr10110277 (CaONFJC)MIL103566 (OCoLC)935230517 |
is_hierarchy_title |
Insider threat protecting the enterprise from sabotage, spying, and theft / |
author2_original_writing_str_mv |
noLinkedField noLinkedField |
_version_ |
1792330672320282625 |