Information technology security & risk management:
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York
Wiley
2006
|
Ausgabe: | 3. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XII, 356 S. |
ISBN: | 0470805749 9780470805749 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV021509251 | ||
003 | DE-604 | ||
005 | 20060503 | ||
007 | t | ||
008 | 060314s2006 |||| 00||| eng d | ||
020 | |a 0470805749 |9 0-470-80574-9 | ||
020 | |a 9780470805749 |9 978-0-470-80574-9 | ||
035 | |a (OCoLC)150388122 | ||
035 | |a (DE-599)BVBBV021509251 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-355 | ||
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Slay, Jill |e Verfasser |4 aut | |
245 | 1 | 0 | |a Information technology security & risk management |c Jill Slay ; Andy Koronios |
246 | 1 | 3 | |a Information technology security and risk management |
250 | |a 3. ed. | ||
264 | 1 | |a New York |b Wiley |c 2006 | |
300 | |a XII, 356 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 7 | |a Informatiesystemen |2 gtt | |
650 | 7 | |a Informatietechnologie |2 gtt | |
650 | 7 | |a Risk management |2 gtt | |
650 | 7 | |a Veiligheidsmaatregelen |2 gtt | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Electronic Commerce |0 (DE-588)4592128-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4151278-9 |a Einführung |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Electronic Commerce |0 (DE-588)4592128-3 |D s |
689 | 0 | |C b |5 DE-604 | |
700 | 1 | |a Koronios, Andy |e Verfasser |4 aut | |
856 | 4 | 2 | |m Digitalisierung UBRegensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014725884&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-014725884 |
Datensatz im Suchindex
_version_ | 1804135244342755328 |
---|---|
adam_text | Contents
Preface p.
Acknowledgements p.
Chapter
An introduction to strategic IT
security and risk management p. l
Chapter overview p.
Risk management p.
Business continuity management p.
Business continuity and IT p.
IT governance p.
Strategic IT security and risk
management p.
IT security context p.
IT security risks p.
IT risk controls p.
Maintaining the risk management
strategy p.
Essential parts of an IT continuity
plan p.
Physical space p.
Human resources p.
IT assets p.
Physical security p.
Ensuring use of the IT security and risk
management strategy p.
Outline of this book p.
Summary p.
Key terms p.
Questions p.
Case study
security pain p.
Suggested reading p.
References p.
Chapter
Building blocks of IT security p.
Chapter overview p.
Securing the components of the IT
system p.
Physical security p.
Logical security p.
Basic frameworks of IT security p.
Access control p.
Security models p.
Protecting information and information
systems p.
Technical controls p.
Management controls p.
Operational controls p.
Summary p.
Key terms p.
Questions p.
Case study
Suggested reading p.
References p.
Chapter
The Australian ethical, legal and
standards framework p.
Chapter overview p.
Ethics p.
Australian law p.
The Australian legal system p.
Telecommunications legislation p.
The Cybercrime Act
Spam legislation p.
Privacy laws p.
Intellectual property law p.
Standards and guidelines p.
OECD
of Information Systems and Networks p.
AS/NZSISO/IEC
of Practice for Information Security
Management p.
HB
Management Guidelines p.
HB
Management of IT Evidence p.
COBIT p.
ITIL p.
The US Federal Chief Information Officers
Council risk management guidelines p.
Summary p.
Key terms p.
Questions p.
Case study
Suggested reading p.
References p.
O
o
I
CD
Chapter
Electronic crime and forensic
computing p.
Chapter overview p.
E-crime p.
Cyber terrorism p.
Categories of electronic crime p.
Paedophilia and sex crimes p.
Fraud and phishing p. Ill
Identity theft p.
Viruses, worms, Trojans and other
malicious code p.
Denial of service p.
Forensic computing p.
Development of forensic computing p.
Forensic investigations p.
Forensic tools p.
Forensic readiness p.
Summary p.
Key terms p.
Questions p.
Case study
Suggested reading p.
References p.
Basic cryptography and Public Key
Infastructure p.
Chapter overview p.
Foundations of cryptography p.
Terminology p.
Strong cryptosystems, algorithms and
keys p.
Cryptographic attacks p.
Types of cipher p.
Substitution ciphers p.
Transposition ciphers p.
Product ciphers p.
One-time pad p.
Running key ciphers p.
Steganography p.
Block and stream ciphers p.
Symmetric and asymmetric
cryptography p.
Symmetric cryptography p.
Asymmetric cryptography p.
Hashing p.
Hash algorithms p.
Message authentication code or digest p.
Digital signatures p.
Key exchange protocols p.
Privacy Enhanced Mail p. 14S
Message Security Protocol p.
Pretty Good Privacy p.
Cryptographic authentication
techniques p.
Cryptographic applications and a Public
Key Infrastructure p.
Certificates p.
Summary p.
Key terms p.
Questions p.
Case study
Suggested reading p.
References p.
Chapter
Securing the network p.
Chapter overview p.
Introduction to network security p.
Network fundamentals p.
Firewall types and techniques p.
Packet filters p.
Gateways p.
Firewall configurations p.
Intrusion detection systems p.
Virtual private networks p.
Inter-network security and network
separation p.
Network isolation p.
Firewalls and perimeter guards p.
Multilevel secure networks p.
Network separation p.
System software security p.
BIOS and boot loader p.
The operating system p.
Antivirus
Summary p,
Key terms p.
Questions p.
Case study
Suggested reading p.
References p.
mmm
Chapter
Securing network operations,
databases and applications p.
Chapter overview p.
Network attack and defence p.
Trends and motivation in hacker
attacks p.
Other network attacks p.
Current trends in securing organisational
IT security p.
Physical security p.
Floods p.
Fire p.
Lightning strikes p.
Developing network security
policies p.
Insecure p.
Partially secure p.
Semi-secure p.
Reasonably secure p.
Secure p.
Securing databases p.
Security of software and
applications p.
Good software engineering p.
Sound coding p.
Summary p.
Key terms p.
Questions p.
Case study
Suggested reading p.
References p.
Chapter
Strategies for e-business
security p.
Chapter overview p.
E-business fundamentals p.
Electronic business security p.
Electronic payment systems
security p.
Types of electronic payment system p.
Electronic payment systems security
requirements p.
Security techniques for electronic payment
systems p.
Electronic payment framework p.
Mobile commerce security p.
Fundamentals of a GSM p.
How GSM works p.
Wireless Application Protocol p.
Mobile commerce security p.
Smart card security p.
Smart card architecture p.
Security issues p.
Biometrie
Legal issues with e-business
security p.
Trade marks p.
Copyright p.
Sales agreements p.
Summary p.
Key terms p.
Questions p.
Case study
Suggested reading p.
References p.
Chapter
Mobile and wireless security p.
Chapter overview p.
Wireless networking and mobile
communications p.
How wireless communications work p.
Basic IT security risks in mobile and
wireless networking p.
The inherent dangers of wireless
communications p.
How wireless communications can be
intercepted or interfered with p.
The IEEE
LANs p.
Wireless LAN topology p.
Wireless LAN security p.
802.11
Attacking wireless LANs p.
Securing wireless communications
with virtual private networks p.
Security threats to current mobile
technology p.
Security threats to third-generation
technology p.
Enhancing mobile phone security p.
a
o
lHHI
Mobile
security p.
Bluetooth technology p.
Security risks of Bluetooth p.
Managing Bluetooth security risks p.
Summary p.
Key terms p.
Questions p.
Case study
wireless hotspots in Australia p.
Suggested reading p.
References p.
Chapter
Security of web services p.
Chapter overview p.
What are web services? p.
Web services model p.
Essentials of a web service p.
Operations in a web service p.
Web services technology p.
Web services in operation p.
Web services security p.
Security challenges posed to web
services p.
Managing web services security p.
Web services security specification p.
Summary p.
Key terms p.
Questions p.
Case study
Suggested reading p.
References p.
Chapter
Emerging issues in IT security p.
Chapter overview p.
Trustworthy computing p.
Trustworthy computing framework p.
RFID technology p.
How RFID systems work p.
Security of RFID systems p.
Security safeguards for RFID
systems p.
Data-at-rest encryption appliance
technology p.
Data in motion encryption p.
Data at rest encryption p.
Quantum encryption p.
How it works p.
Quantum encryption protocols p.
Privacy on the Internet p.
Cookies p.
Surfing history p.
Information gathered by agencies p.
Freeware software p.
Electronic commerce p.
Email p.
Spam p.
Chatrooms p.
Information security and civil liberties in
cyberspace p.
Authenticity p.
Role of institutions in establishing
authenticity on the Internet p.
Summary p.
Key terms p.
Questions p.
Case study
References p.
Glossary p.
Index p.
|
adam_txt |
Contents
Preface p.
Acknowledgements p.
Chapter
An introduction to strategic IT
security and risk management p. l
Chapter overview p.
Risk management p.
Business continuity management p.
Business continuity and IT p.
IT governance p.
Strategic IT security and risk
management p.
IT security context p.
IT security risks p.
IT risk controls p.
Maintaining the risk management
strategy p.
Essential parts of an IT continuity
plan p.
Physical space p.
Human resources p.
IT assets p.
Physical security p.
Ensuring use of the IT security and risk
management strategy p.
Outline of this book p.
Summary p.
Key terms p.
Questions p.
Case study
security pain p.
Suggested reading p.
References p.
Chapter
Building blocks of IT security p.
Chapter overview p.
Securing the components of the IT
system p.
Physical security p.
Logical security p.
Basic frameworks of IT security p.
Access control p.
Security models p.
Protecting information and information
systems p.
Technical controls p.
Management controls p.
Operational controls p.
Summary p.
Key terms p.
Questions p.
Case study
Suggested reading p.
References p.
Chapter
The Australian ethical, legal and
standards framework p.
Chapter overview p.
Ethics p.
Australian law p.
The Australian legal system p.
Telecommunications legislation p.
The Cybercrime Act
Spam legislation p.
Privacy laws p.
Intellectual property law p.
Standards and guidelines p.
OECD
of Information Systems and Networks p.
AS/NZSISO/IEC
of Practice for Information Security
Management p.
HB
Management Guidelines p.
HB
Management of IT Evidence p.
COBIT p.
ITIL p.
The US Federal Chief Information Officers
Council risk management guidelines p.
Summary p.
Key terms p.
Questions p.
Case study
Suggested reading p.
References p.
O
o
I
CD
Chapter
Electronic crime and forensic
computing p.
Chapter overview p.
E-crime p.
Cyber terrorism p.
Categories of electronic crime p.
Paedophilia and sex crimes p.
Fraud and phishing p. Ill
Identity theft p.
Viruses, worms, Trojans and other
malicious code p.
Denial of service p.
Forensic computing p.
Development of forensic computing p.
Forensic investigations p.
Forensic tools p.
Forensic readiness p.
Summary p.
Key terms p.
Questions p.
Case study
Suggested reading p.
References p.
Basic cryptography and Public Key
Infastructure p.
Chapter overview p.
Foundations of cryptography p.
Terminology p.
Strong cryptosystems, algorithms and
keys p.
Cryptographic attacks p.
Types of cipher p.
Substitution ciphers p.
Transposition ciphers p.
Product ciphers p.
One-time pad p.
Running key ciphers p.
Steganography p.
Block and stream ciphers p.
Symmetric and asymmetric
cryptography p.
Symmetric cryptography p.
Asymmetric cryptography p.
Hashing p.
Hash algorithms p.
Message authentication code or digest p.
Digital signatures p.
Key exchange protocols p.
Privacy Enhanced Mail p. 14S
Message Security Protocol p.
Pretty Good Privacy p.
Cryptographic authentication
techniques p.
Cryptographic applications and a Public
Key Infrastructure p.
Certificates p.
Summary p.
Key terms p.
Questions p.
Case study
Suggested reading p.
References p.
Chapter
Securing the network p.
Chapter overview p.
Introduction to network security p.
Network fundamentals p.
Firewall types and techniques p.
Packet filters p.
Gateways p.
Firewall configurations p.
Intrusion detection systems p.
Virtual private networks p.
Inter-network security and network
separation p.
Network isolation p.
Firewalls and perimeter guards p.
Multilevel secure networks p.
Network separation p.
System software security p.
BIOS and boot loader p.
The operating system p.
Antivirus
Summary p,
Key terms p.
Questions p.
Case study
Suggested reading p.
References p.
mmm
Chapter
Securing network operations,
databases and applications p.
Chapter overview p.
Network attack and defence p.
Trends and motivation in hacker
attacks p.
Other network attacks p.
Current trends in securing organisational
IT security p.
Physical security p.
Floods p.
Fire p.
Lightning strikes p.
Developing network security
policies p.
Insecure p.
Partially secure p.
Semi-secure p.
Reasonably secure p.
Secure p.
Securing databases p.
Security of software and
applications p.
Good software engineering p.
Sound coding p.
Summary p.
Key terms p.
Questions p.
Case study
Suggested reading p.
References p.
Chapter
Strategies for e-business
security p.
Chapter overview p.
E-business fundamentals p.
Electronic business security p.
Electronic payment systems
security p.
Types of electronic payment system p.
Electronic payment systems security
requirements p.
Security techniques for electronic payment
systems p.
Electronic payment framework p.
Mobile commerce security p.
Fundamentals of a GSM p.
How GSM works p.
Wireless Application Protocol p.
Mobile commerce security p.
Smart card security p.
Smart card architecture p.
Security issues p.
Biometrie
Legal issues with e-business
security p.
Trade marks p.
Copyright p.
Sales agreements p.
Summary p.
Key terms p.
Questions p.
Case study
Suggested reading p.
References p.
Chapter
Mobile and wireless security p.
Chapter overview p.
Wireless networking and mobile
communications p.
How wireless communications work p.
Basic IT security risks in mobile and
wireless networking p.
The inherent dangers of wireless
communications p.
How wireless communications can be
intercepted or interfered with p.
The IEEE
LANs p.
Wireless LAN topology p.
Wireless LAN security p.
802.11
Attacking wireless LANs p.
Securing wireless communications
with virtual private networks p.
Security threats to current mobile
technology p.
Security threats to third-generation
technology p.
Enhancing mobile phone security p.
a
o
lHHI
Mobile
security p.
Bluetooth technology p.
Security risks of Bluetooth p.
Managing Bluetooth security risks p.
Summary p.
Key terms p.
Questions p.
Case study
wireless hotspots in Australia p.
Suggested reading p.
References p.
Chapter
Security of web services p.
Chapter overview p.
What are web services? p.
Web services model p.
Essentials of a web service p.
Operations in a web service p.
Web services technology p.
Web services in operation p.
Web services security p.
Security challenges posed to web
services p.
Managing web services security p.
Web services security specification p.
Summary p.
Key terms p.
Questions p.
Case study
Suggested reading p.
References p.
Chapter
Emerging issues in IT security p.
Chapter overview p.
Trustworthy computing p.
Trustworthy computing framework p.
RFID technology p.
How RFID systems work p.
Security of RFID systems p.
Security safeguards for RFID
systems p.
Data-at-rest encryption appliance
technology p.
Data in motion encryption p.
Data at rest encryption p.
Quantum encryption p.
How it works p.
Quantum encryption protocols p.
Privacy on the Internet p.
Cookies p.
Surfing history p.
Information gathered by agencies p.
Freeware software p.
Electronic commerce p.
Email p.
Spam p.
Chatrooms p.
Information security and civil liberties in
cyberspace p.
Authenticity p.
Role of institutions in establishing
authenticity on the Internet p.
Summary p.
Key terms p.
Questions p.
Case study
References p.
Glossary p.
Index p. |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Slay, Jill Koronios, Andy |
author_facet | Slay, Jill Koronios, Andy |
author_role | aut aut |
author_sort | Slay, Jill |
author_variant | j s js a k ak |
building | Verbundindex |
bvnumber | BV021509251 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)150388122 (DE-599)BVBBV021509251 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | 3. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01754nam a2200469 c 4500</leader><controlfield tag="001">BV021509251</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20060503 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">060314s2006 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470805749</subfield><subfield code="9">0-470-80574-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470805749</subfield><subfield code="9">978-0-470-80574-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)150388122</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV021509251</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Slay, Jill</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information technology security & risk management</subfield><subfield code="c">Jill Slay ; Andy Koronios</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Information technology security and risk management</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">3. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York</subfield><subfield code="b">Wiley</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 356 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Informatiesystemen</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Informatietechnologie</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Risk management</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Veiligheidsmaatregelen</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Electronic Commerce</subfield><subfield code="0">(DE-588)4592128-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4151278-9</subfield><subfield code="a">Einführung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Electronic Commerce</subfield><subfield code="0">(DE-588)4592128-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="C">b</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Koronios, Andy</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UBRegensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014725884&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-014725884</subfield></datafield></record></collection> |
genre | (DE-588)4151278-9 Einführung gnd-content |
genre_facet | Einführung |
id | DE-604.BV021509251 |
illustrated | Not Illustrated |
index_date | 2024-07-02T14:18:15Z |
indexdate | 2024-07-09T20:37:25Z |
institution | BVB |
isbn | 0470805749 9780470805749 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-014725884 |
oclc_num | 150388122 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | XII, 356 S. |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Wiley |
record_format | marc |
spelling | Slay, Jill Verfasser aut Information technology security & risk management Jill Slay ; Andy Koronios Information technology security and risk management 3. ed. New York Wiley 2006 XII, 356 S. txt rdacontent n rdamedia nc rdacarrier Informatiesystemen gtt Informatietechnologie gtt Risk management gtt Veiligheidsmaatregelen gtt Computer security Electronic Commerce (DE-588)4592128-3 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)4151278-9 Einführung gnd-content Computersicherheit (DE-588)4274324-2 s Electronic Commerce (DE-588)4592128-3 s b DE-604 Koronios, Andy Verfasser aut Digitalisierung UBRegensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014725884&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Slay, Jill Koronios, Andy Information technology security & risk management Informatiesystemen gtt Informatietechnologie gtt Risk management gtt Veiligheidsmaatregelen gtt Computer security Electronic Commerce (DE-588)4592128-3 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4592128-3 (DE-588)4274324-2 (DE-588)4151278-9 |
title | Information technology security & risk management |
title_alt | Information technology security and risk management |
title_auth | Information technology security & risk management |
title_exact_search | Information technology security & risk management |
title_exact_search_txtP | Information technology security & risk management |
title_full | Information technology security & risk management Jill Slay ; Andy Koronios |
title_fullStr | Information technology security & risk management Jill Slay ; Andy Koronios |
title_full_unstemmed | Information technology security & risk management Jill Slay ; Andy Koronios |
title_short | Information technology security & risk management |
title_sort | information technology security risk management |
topic | Informatiesystemen gtt Informatietechnologie gtt Risk management gtt Veiligheidsmaatregelen gtt Computer security Electronic Commerce (DE-588)4592128-3 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Informatiesystemen Informatietechnologie Risk management Veiligheidsmaatregelen Computer security Electronic Commerce Computersicherheit Einführung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014725884&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT slayjill informationtechnologysecurityriskmanagement AT koroniosandy informationtechnologysecurityriskmanagement AT slayjill informationtechnologysecurityandriskmanagement AT koroniosandy informationtechnologysecurityandriskmanagement |