008 |
|
100319s2008 xxu e eng d |
015 |
|
|a2007043997
|
020 |
|
|a0313345597 ((e-Book))
|
020 |
|
|a9780313345593 ((e-Book))
|
020 |
|
|a0313345589 ((alk. paper))
|
020 |
|
|a9780313345586 ((alk. paper))
|
035 |
|
|a2007043997
|
035 |
|
|aABC0313345597
|
040 |
|
|aTMUE|beng|cTMUE|dTMUE
|
050 |
14
|
|aHF5548.37|bA44 2008
|
082 |
04
|
|a005.8|222
|
100 |
1
|
|aAlexanderPhilip|d1963
|
245 |
10
|
|aInformation security|h[[electronic resource]] : |ba manager's guide to thwarting data thieves and hackers / |cPhilip Alexander
|
260 |
|
|aWestport, Conn : |bPraeger Security International, |c2008
|
300 |
|
|aviii, 175 p ; |c24 cm
|
490 |
1
|
|aPSI business security
|
500 |
|
|aIncludes index
|
505 |
1
|
|aComputer use and data security policies and standards--Network/DMZ design--Defense in depth--Authentication and authorization--Security and the mobile employee--Business continuity planning--Hackers, snoops, and viruses--Personnel issues and hiring practices--Contractual considerations--Data privacy laws--Overseas outsourcing
|
650 |
0
|
|aBusiness enterprises|xComputer networks|xSecurity measures
|
650 |
0
|
|aInformation technology|xSecurity measures
|
650 |
0
|
|aComputer security
|
650 |
0
|
|aData protection
|
856 |
7
|
|uhttp://ebooks.abc-clio.com/?isbn=9780313345593|zAn electronic book in the ABC-CLIO eBooks Online database, accessible through the World Wide Web; click for information
|