Information security : a manager's guide to thwarting data thieves and hackers / / Philip Alexander.

Saved in:
Bibliographic Details
Superior document:PSI business security
:
TeilnehmendeR:
Year of Publication:2008
Language:English
Series:PSI business security.
Online Access:
Physical Description:viii, 175 p.
Notes:Includes index.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 500339307
ctrlnum (MiAaPQ)500339307
(Au-PeEL)EBL339307
(CaPaEBR)ebr10481060
(CaONFJC)MIL130177
(OCoLC)218464465
collection bib_alma
record_format marc
spelling Alexander, Philip, 1963-
Information security [electronic resource] : a manager's guide to thwarting data thieves and hackers / Philip Alexander.
Westport, Conn. : Praeger Security International, 2008.
viii, 175 p.
PSI business security
Includes index.
Computer use and data security policies and standards -- Network/DMZ design -- Defense in depth -- Authentication and authorization -- Security and the mobile employee -- Business continuity planning -- Hackers, snoops, and viruses -- Personnel issues and hiring practices -- Contractual considerations -- Data privacy laws -- Overseas outsourcing.
Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
Business enterprises Computer networks Security measures.
Information technology Security measures.
Computer security.
Data protection.
Electronic books.
ProQuest (Firm)
PSI business security.
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=339307 Click to View
language English
format Electronic
eBook
author Alexander, Philip, 1963-
spellingShingle Alexander, Philip, 1963-
Information security a manager's guide to thwarting data thieves and hackers /
PSI business security
Computer use and data security policies and standards -- Network/DMZ design -- Defense in depth -- Authentication and authorization -- Security and the mobile employee -- Business continuity planning -- Hackers, snoops, and viruses -- Personnel issues and hiring practices -- Contractual considerations -- Data privacy laws -- Overseas outsourcing.
author_facet Alexander, Philip, 1963-
ProQuest (Firm)
ProQuest (Firm)
author_variant p a pa
author2 ProQuest (Firm)
author2_role TeilnehmendeR
author_corporate ProQuest (Firm)
author_sort Alexander, Philip, 1963-
title Information security a manager's guide to thwarting data thieves and hackers /
title_sub a manager's guide to thwarting data thieves and hackers /
title_full Information security [electronic resource] : a manager's guide to thwarting data thieves and hackers / Philip Alexander.
title_fullStr Information security [electronic resource] : a manager's guide to thwarting data thieves and hackers / Philip Alexander.
title_full_unstemmed Information security [electronic resource] : a manager's guide to thwarting data thieves and hackers / Philip Alexander.
title_auth Information security a manager's guide to thwarting data thieves and hackers /
title_new Information security
title_sort information security a manager's guide to thwarting data thieves and hackers /
series PSI business security
series2 PSI business security
publisher Praeger Security International,
publishDate 2008
physical viii, 175 p.
contents Computer use and data security policies and standards -- Network/DMZ design -- Defense in depth -- Authentication and authorization -- Security and the mobile employee -- Business continuity planning -- Hackers, snoops, and viruses -- Personnel issues and hiring practices -- Contractual considerations -- Data privacy laws -- Overseas outsourcing.
isbn 9780313345593 (electronic bk.)
callnumber-first H - Social Science
callnumber-subject HF - Commerce
callnumber-label HF5548
callnumber-sort HF 45548.37 A44 42008
genre Electronic books.
genre_facet Electronic books.
url https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=339307
illustrated Not Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8
dewey-sort 15.8
dewey-raw 005.8
dewey-search 005.8
oclc_num 218464465
work_keys_str_mv AT alexanderphilip informationsecurityamanagersguidetothwartingdatathievesandhackers
AT proquestfirm informationsecurityamanagersguidetothwartingdatathievesandhackers
status_str n
ids_txt_mv (MiAaPQ)500339307
(Au-PeEL)EBL339307
(CaPaEBR)ebr10481060
(CaONFJC)MIL130177
(OCoLC)218464465
hierarchy_parent_title PSI business security
is_hierarchy_title Information security a manager's guide to thwarting data thieves and hackers /
container_title PSI business security
author2_original_writing_str_mv noLinkedField
_version_ 1792330683529560064
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01892nam a2200421 a 4500</leader><controlfield tag="001">500339307</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">071025s2008 ctu s 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2007043997</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780313345586 (alk. paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780313345593 (electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)500339307</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL339307</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10481060</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL130177</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)218464465</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HF5548.37</subfield><subfield code="b">.A44 2008</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Alexander, Philip,</subfield><subfield code="d">1963-</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security</subfield><subfield code="h">[electronic resource] :</subfield><subfield code="b">a manager's guide to thwarting data thieves and hackers /</subfield><subfield code="c">Philip Alexander.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Westport, Conn. :</subfield><subfield code="b">Praeger Security International,</subfield><subfield code="c">2008.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">viii, 175 p.</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">PSI business security</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Computer use and data security policies and standards -- Network/DMZ design -- Defense in depth -- Authentication and authorization -- Security and the mobile employee -- Business continuity planning -- Hackers, snoops, and viruses -- Personnel issues and hiring practices -- Contractual considerations -- Data privacy laws -- Overseas outsourcing.</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">PSI business security.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=339307</subfield><subfield code="z">Click to View</subfield></datafield></record></collection>