Information security: design, implementation, measurement, and compliance
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boca Raton
Auerbach Publications
2007
|
Schlagworte: | |
Online-Zugang: | UBM01 |
Beschreibung: | MyiLibrary e-book project |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781280651649 9781420013412 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV023239234 | ||
003 | DE-604 | ||
005 | 20180528 | ||
007 | cr|uuu---uuuuu | ||
008 | 080404s2007 xxu|||| o||u| ||||||eng d | ||
020 | |a 9781280651649 |9 978-1-280-65164-9 | ||
020 | |a 9781420013412 |9 978-1-420-01341-2 | ||
035 | |a (OCoLC)730304246 | ||
035 | |a (DE-599)BVBBV023239234 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-19 | ||
050 | 0 | |a HF5548.37 | |
082 | 0 | |a 658.4/78 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Layton, Timothy P. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Information security |b design, implementation, measurement, and compliance |c Timothy P. Layton |
264 | 1 | |a Boca Raton |b Auerbach Publications |c 2007 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a MyiLibrary e-book project | ||
650 | 4 | |a Datenverarbeitung | |
650 | 4 | |a Unternehmen | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Business |x Data processing |x Security measures | |
650 | 4 | |a Business enterprises |x Computer networks |x Security measures | |
650 | 4 | |a Data protection | |
650 | 4 | |a Computer security | |
650 | 4 | |a Risk assessment | |
650 | 4 | |a Confidential business information | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-0-849-37087-8 |
912 | |a ZDB-30-PQE |a ZDB-26-MYL |a ebook | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-016424806 | ||
966 | e | |u https://ebookcentral.proquest.com/lib/ub-lmu/detail.action?docID=267956&query=9780849370878 |l UBM01 |p ZDB-30-PQE |q UBM_Einzelkauf |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804137535854608384 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Layton, Timothy P. |
author_facet | Layton, Timothy P. |
author_role | aut |
author_sort | Layton, Timothy P. |
author_variant | t p l tp tpl |
building | Verbundindex |
bvnumber | BV023239234 |
callnumber-first | H - Social Science |
callnumber-label | HF5548 |
callnumber-raw | HF5548.37 |
callnumber-search | HF5548.37 |
callnumber-sort | HF 45548.37 |
callnumber-subject | HF - Commerce |
classification_rvk | ST 276 |
collection | ZDB-30-PQE ZDB-26-MYL ebook |
ctrlnum | (OCoLC)730304246 (DE-599)BVBBV023239234 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Informatik Wirtschaftswissenschaften |
discipline_str_mv | Informatik Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01630nmm a2200469zc 4500</leader><controlfield tag="001">BV023239234</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180528 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">080404s2007 xxu|||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781280651649</subfield><subfield code="9">978-1-280-65164-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781420013412</subfield><subfield code="9">978-1-420-01341-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)730304246</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV023239234</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-19</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HF5548.37</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Layton, Timothy P.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security</subfield><subfield code="b">design, implementation, measurement, and compliance</subfield><subfield code="c">Timothy P. Layton</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton</subfield><subfield code="b">Auerbach Publications</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">MyiLibrary e-book project</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Datenverarbeitung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Unternehmen</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business</subfield><subfield code="x">Data processing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk assessment</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Confidential business information</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-0-849-37087-8</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield><subfield code="a">ZDB-26-MYL</subfield><subfield code="a">ebook</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016424806</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/ub-lmu/detail.action?docID=267956&query=9780849370878</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">UBM_Einzelkauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV023239234 |
illustrated | Not Illustrated |
index_date | 2024-07-02T20:23:15Z |
indexdate | 2024-07-09T21:13:51Z |
institution | BVB |
isbn | 9781280651649 9781420013412 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016424806 |
oclc_num | 730304246 |
open_access_boolean | |
owner | DE-19 DE-BY-UBM |
owner_facet | DE-19 DE-BY-UBM |
physical | 1 Online-Ressource |
psigel | ZDB-30-PQE ZDB-26-MYL ebook ZDB-30-PQE UBM_Einzelkauf |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Auerbach Publications |
record_format | marc |
spelling | Layton, Timothy P. Verfasser aut Information security design, implementation, measurement, and compliance Timothy P. Layton Boca Raton Auerbach Publications 2007 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier MyiLibrary e-book project Datenverarbeitung Unternehmen Wirtschaft Business Data processing Security measures Business enterprises Computer networks Security measures Data protection Computer security Risk assessment Confidential business information Erscheint auch als Druck-Ausgabe 978-0-849-37087-8 |
spellingShingle | Layton, Timothy P. Information security design, implementation, measurement, and compliance Datenverarbeitung Unternehmen Wirtschaft Business Data processing Security measures Business enterprises Computer networks Security measures Data protection Computer security Risk assessment Confidential business information |
title | Information security design, implementation, measurement, and compliance |
title_auth | Information security design, implementation, measurement, and compliance |
title_exact_search | Information security design, implementation, measurement, and compliance |
title_exact_search_txtP | Information security design, implementation, measurement, and compliance |
title_full | Information security design, implementation, measurement, and compliance Timothy P. Layton |
title_fullStr | Information security design, implementation, measurement, and compliance Timothy P. Layton |
title_full_unstemmed | Information security design, implementation, measurement, and compliance Timothy P. Layton |
title_short | Information security |
title_sort | information security design implementation measurement and compliance |
title_sub | design, implementation, measurement, and compliance |
topic | Datenverarbeitung Unternehmen Wirtschaft Business Data processing Security measures Business enterprises Computer networks Security measures Data protection Computer security Risk assessment Confidential business information |
topic_facet | Datenverarbeitung Unternehmen Wirtschaft Business Data processing Security measures Business enterprises Computer networks Security measures Data protection Computer security Risk assessment Confidential business information |
work_keys_str_mv | AT laytontimothyp informationsecuritydesignimplementationmeasurementandcompliance |