Information security : a manager's guide to thwarting data thieves and hackers / / Philip Alexander.
Saved in:
Superior document: | PSI business security |
---|---|
: | |
TeilnehmendeR: | |
Year of Publication: | 2008 |
Language: | English |
Series: | PSI business security.
|
Online Access: | |
Physical Description: | viii, 175 p. |
Notes: | Includes index. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
500339307 |
---|---|
ctrlnum |
(MiAaPQ)500339307 (Au-PeEL)EBL339307 (CaPaEBR)ebr10481060 (CaONFJC)MIL130177 (OCoLC)218464465 |
collection |
bib_alma |
record_format |
marc |
spelling |
Alexander, Philip, 1963- Information security [electronic resource] : a manager's guide to thwarting data thieves and hackers / Philip Alexander. Westport, Conn. : Praeger Security International, 2008. viii, 175 p. PSI business security Includes index. Computer use and data security policies and standards -- Network/DMZ design -- Defense in depth -- Authentication and authorization -- Security and the mobile employee -- Business continuity planning -- Hackers, snoops, and viruses -- Personnel issues and hiring practices -- Contractual considerations -- Data privacy laws -- Overseas outsourcing. Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. Business enterprises Computer networks Security measures. Information technology Security measures. Computer security. Data protection. Electronic books. ProQuest (Firm) PSI business security. https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=339307 Click to View |
language |
English |
format |
Electronic eBook |
author |
Alexander, Philip, 1963- |
spellingShingle |
Alexander, Philip, 1963- Information security a manager's guide to thwarting data thieves and hackers / PSI business security Computer use and data security policies and standards -- Network/DMZ design -- Defense in depth -- Authentication and authorization -- Security and the mobile employee -- Business continuity planning -- Hackers, snoops, and viruses -- Personnel issues and hiring practices -- Contractual considerations -- Data privacy laws -- Overseas outsourcing. |
author_facet |
Alexander, Philip, 1963- ProQuest (Firm) ProQuest (Firm) |
author_variant |
p a pa |
author2 |
ProQuest (Firm) |
author2_role |
TeilnehmendeR |
author_corporate |
ProQuest (Firm) |
author_sort |
Alexander, Philip, 1963- |
title |
Information security a manager's guide to thwarting data thieves and hackers / |
title_sub |
a manager's guide to thwarting data thieves and hackers / |
title_full |
Information security [electronic resource] : a manager's guide to thwarting data thieves and hackers / Philip Alexander. |
title_fullStr |
Information security [electronic resource] : a manager's guide to thwarting data thieves and hackers / Philip Alexander. |
title_full_unstemmed |
Information security [electronic resource] : a manager's guide to thwarting data thieves and hackers / Philip Alexander. |
title_auth |
Information security a manager's guide to thwarting data thieves and hackers / |
title_new |
Information security |
title_sort |
information security a manager's guide to thwarting data thieves and hackers / |
series |
PSI business security |
series2 |
PSI business security |
publisher |
Praeger Security International, |
publishDate |
2008 |
physical |
viii, 175 p. |
contents |
Computer use and data security policies and standards -- Network/DMZ design -- Defense in depth -- Authentication and authorization -- Security and the mobile employee -- Business continuity planning -- Hackers, snoops, and viruses -- Personnel issues and hiring practices -- Contractual considerations -- Data privacy laws -- Overseas outsourcing. |
isbn |
9780313345593 (electronic bk.) |
callnumber-first |
H - Social Science |
callnumber-subject |
HF - Commerce |
callnumber-label |
HF5548 |
callnumber-sort |
HF 45548.37 A44 42008 |
genre |
Electronic books. |
genre_facet |
Electronic books. |
url |
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=339307 |
illustrated |
Not Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
005 - Computer programming, programs & data |
dewey-full |
005.8 |
dewey-sort |
15.8 |
dewey-raw |
005.8 |
dewey-search |
005.8 |
oclc_num |
218464465 |
work_keys_str_mv |
AT alexanderphilip informationsecurityamanagersguidetothwartingdatathievesandhackers AT proquestfirm informationsecurityamanagersguidetothwartingdatathievesandhackers |
status_str |
n |
ids_txt_mv |
(MiAaPQ)500339307 (Au-PeEL)EBL339307 (CaPaEBR)ebr10481060 (CaONFJC)MIL130177 (OCoLC)218464465 |
hierarchy_parent_title |
PSI business security |
is_hierarchy_title |
Information security a manager's guide to thwarting data thieves and hackers / |
container_title |
PSI business security |
author2_original_writing_str_mv |
noLinkedField |
_version_ |
1792330683529560064 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01892nam a2200421 a 4500</leader><controlfield tag="001">500339307</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">071025s2008 ctu s 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2007043997</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780313345586 (alk. paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780313345593 (electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)500339307</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL339307</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10481060</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL130177</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)218464465</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HF5548.37</subfield><subfield code="b">.A44 2008</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Alexander, Philip,</subfield><subfield code="d">1963-</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security</subfield><subfield code="h">[electronic resource] :</subfield><subfield code="b">a manager's guide to thwarting data thieves and hackers /</subfield><subfield code="c">Philip Alexander.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Westport, Conn. :</subfield><subfield code="b">Praeger Security International,</subfield><subfield code="c">2008.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">viii, 175 p.</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">PSI business security</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Computer use and data security policies and standards -- Network/DMZ design -- Defense in depth -- Authentication and authorization -- Security and the mobile employee -- Business continuity planning -- Hackers, snoops, and viruses -- Personnel issues and hiring practices -- Contractual considerations -- Data privacy laws -- Overseas outsourcing.</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">PSI business security.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=339307</subfield><subfield code="z">Click to View</subfield></datafield></record></collection> |