Managing Risk and Information Security: Protect to Enable
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berkeley, CA
Apress
2013
|
Schlagworte: | |
Online-Zugang: | FHM01 FHN01 FHR01 FNU01 FWS01 FWS02 UBA01 Volltext Abstract |
Beschreibung: | 1 Online-Ressource (XVII, 152 p.) |
ISBN: | 9781430251149 |
DOI: | 10.1007/978-1-4302-5114-9 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV040977975 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 130502s2013 |||| o||u| ||||||eng d | ||
020 | |a 9781430251149 |c Online |9 978-1-4302-5114-9 | ||
024 | 7 | |a 10.1007/978-1-4302-5114-9 |2 doi | |
035 | |a (OCoLC)843455388 | ||
035 | |a (DE-599)BVBBV040977975 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-M347 |a DE-863 |a DE-862 |a DE-1049 |a DE-92 |a DE-898 |a DE-1049 |a DE-384 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Harkins, Malcolm |e Verfasser |0 (DE-588)1034181076 |4 aut | |
245 | 1 | 0 | |a Managing Risk and Information Security |b Protect to Enable |c by Malcolm Harkins |
264 | 1 | |a Berkeley, CA |b Apress |c 2013 | |
300 | |a 1 Online-Ressource (XVII, 152 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-1-4302-5113-2 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4302-5114-9 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025956032&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-CWD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-025956032 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1007/978-1-4302-5114-9 |l FHM01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4302-5114-9 |l FHN01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4302-5114-9 |l FHR01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4302-5114-9 |l FNU01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4302-5114-9 |l FWS01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4302-5114-9 |l FWS02 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4302-5114-9 |l UBA01 |p ZDB-2-CWD |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 486672 |
---|---|
_version_ | 1806178795968790528 |
adam_text | MANAGING RISK AND INFORMATION SECURITY
/ HARKINS, MALCOLM
: 2013
ABSTRACT / INHALTSTEXT
MANAGING RISK AND INFORMATION SECURITY: PROTECT TO ENABLE, AN APRESSOPEN
TITLE, DESCRIBES THE CHANGING RISK ENVIRONMENT AND WHY A FRESH APPROACH
TO INFORMATION SECURITY IS NEEDED. BECAUSE ALMOST EVERY ASPECT OF AN
ENTERPRISE IS NOW DEPENDENT ON TECHNOLOGY, THE FOCUS OF IT SECURITY MUST
SHIFT FROM LOCKING DOWN ASSETS TO ENABLING THE BUSINESS WHILE MANAGING
AND SURVIVING RISK. THIS COMPACT BOOK DISCUSSES BUSINESS RISK FROM A
BROADER PERSPECTIVE, INCLUDING PRIVACY AND REGULATORY CONSIDERATIONS. IT
DESCRIBES THE INCREASING NUMBER OF THREATS AND VULNERABILITIES, BUT ALSO
OFFERS STRATEGIES FOR DEVELOPING SOLUTIONS. THESE INCLUDE DISCUSSIONS OF
HOW ENTERPRISES CAN TAKE ADVANTAGE OF NEW AND EMERGING
TECHNOLOGIES—SUCH AS SOCIAL MEDIA AND THE HUGE PROLIFERATION OF
INTERNET-ENABLED DEVICES—WHILE MINIMIZING RISK.WITH APRESSOPEN,
CONTENT IS FREELY AVAILABLE THROUGH MULTIPLE ONLINE DISTRIBUTION
CHANNELS AND ELECTRONIC FORMATS WITH THE GOAL OF DISSEMINATING
PROFESSIONALLY EDITED AND TECHNICALLY REVIEWED CONTENT TO THE WORLDWIDE
COMMUNITY.HERE ARE SOME OF THE RESPONSES FROM REVIEWERS OF THIS
EXCEPTIONAL WORK: “MANAGING RISK AND INFORMATION SECURITY IS A
PERCEPTIVE, BALANCED, AND OFTEN THOUGHT-PROVOKING EXPLORATION OF
EVOLVING INFORMATION RISK AND SECURITY CHALLENGES WITHIN A BUSINESS
CONTEXT. HARKINS CLEARLY CONNECTS THE NEEDED, BUT OFTEN-OVERLOOKED
LINKAGE AND DIALOG BETWEEN THE BUSINESS AND TECHNICAL WORLDS AND OFFERS
ACTIONABLE STRATEGIES. THE BOOK CONTAINS EYE-OPENING SECURITY
INSIGHTS THAT ARE EASILY UNDERSTOOD, EVEN BY THE CURIOUS LAYMAN.” FRED
WETTLING, BECHTEL FELLOW, IS&T ETHICS & COMPLIANCE OFFICER, BECHTEL
“AS DISRUPTIVE TECHNOLOGY INNOVATIONS AND ESCALATING CYBER THREATS
CONTINUE TO CREATE ENORMOUS INFORMATION SECURITY CHALLENGES, MANAGING
RISK AND INFORMATION SECURITY: PROTECT TO ENABLE PROVIDES A MUCH-NEEDED
PERSPECTIVE. THIS BOOK COMPELS INFORMATION SECURITY PROFESSIONALS TO
THINK DIFFERENTLY ABOUT CONCEPTS OF RISK MANAGEMENT IN ORDER TO BE MORE
EFFECTIVE.THE SPECIFIC AND PRACTICAL GUIDANCE OFFERS A FAST-TRACK
FORMULA FOR DEVELOPING INFORMATION SECURITY STRATEGIES WHICH ARE
LOCK-STEP WITH BUSINESS PRIORITIES.” LAURA ROBINSON, PRINCIPAL,
ROBINSON INSIGHT CHAIR, SECURITY FOR BUSINESS INNOVATION COUNCIL (SBIC)
PROGRAM DIRECTOR, EXECUTIVE SECURITY ACTION FORUM (ESAF) “THE MANDATE
OF THE INFORMATION SECURITY FUNCTION IS BEING COMPLETELY REWRITTEN.
UNFORTUNATELY MOST HEADS OF SECURITY HAVEN’T PICKED UP ON THE CHANGE,
IMPEDING THEIR COMPANIES’ AGILITY AND ABILITY TO INNOVATE. THIS BOOK
MAKES THE CASE FOR WHY SECURITY NEEDS TO CHANGE, AND SHOWS HOW TO GET
STARTED. IT WILL BE REGARDED AS MARKING THE TURNING POINT IN INFORMATION
SECURITY FOR YEARS TO COME.” DR. JEREMY BERGSMAN, PRACTICE MANAGER,
CEB “THE WORLD WE ARE RESPONSIBLE TO PROTECT IS CHANGING
DRAMATICALLY AND AT AN ACCELERATING PACE. TECHNOLOGY IS PERVASIVE IN
VIRTUALLY EVERY ASPECT OF OUR LIVES.CLOUDS, VIRTUALIZATION AND MOBILE
ARE REDEFINING COMPUTING – AND THEY ARE JUST THE BEGINNING OF WHAT IS
TO COME. YOUR SECURITY PERIMETER IS DEFINED BY WHEREVER YOUR INFORMATION
AND PEOPLE HAPPEN TO BE. WE ARE ATTACKED BY PROFESSIONAL ADVERSARIES WHO
ARE BETTER FUNDED THAN WE WILL EVER BE. WE IN THE INFORMATION SECURITY
PROFESSION MUST CHANGE AS DRAMATICALLY AS THE ENVIRONMENT WE PROTECT. WE
NEED NEW SKILLS AND NEW STRATEGIES TO DO OUR JOBS EFFECTIVELY. WE
LITERALLY NEED TO CHANGE THE WAY WE THINK. WRITTEN BY ONE OF THE BEST
IN THE BUSINESS, MANAGING RISK AND INFORMATION SECURITY CHALLENGES
TRADITIONAL SECURITY THEORY WITH CLEAR EXAMPLES OF THE NEED FOR CHANGE.
IT ALSO PROVIDES EXPERT ADVICE ON HOW TO DRAMATICALLY INCREASE THE
SUCCESS OF YOUR SECURITY STRATEGY AND METHODS – FROM DEALING WITH THE
MISPERCEPTION OF RISK TO HOW TO BECOME A Z-SHAPED CISO. MANAGING RISK
AND INFORMATION SECURITY IS THE ULTIMATE TREATISE ON HOW TO DELIVER
EFFECTIVE SECURITY TO THE WORLD WE LIVE IN FOR THE NEXT 10 YEARS. IT IS
ABSOLUTE MUST READING FOR ANYONE IN OUR PROFESSION – AND SHOULD BE ON
THE DESK OF EVERY CISO IN THE WORLD.” DAVE CULLINANE, CISSP CEO
SECURITY STARFISH, LLC “IN THIS OVERVIEW, MALCOLM HARKINS DELIVERS AN
INSIGHTFUL SURVEY OF THE TRENDS, THREATS, AND TACTICS SHAPING
INFORMATION RISK AND SECURITY. FROM REGULATORY COMPLIANCE TO PSYCHOLOGY
TO THE CHANGING THREAT CONTEXT, THIS WORK PROVIDES A COMPELLING
INTRODUCTION TO AN IMPORTANT TOPIC AND TRAINS HELPFUL ATTENTION ON THE
EFFECTS OF CHANGING TECHNOLOGY AND MANAGEMENT PRACTICES.” DR.
MARIANO-FLORENTINO CUELLAR PROFESSOR, STANFORD LAW SCHOOL CO-DIRECTOR,
STANFORD CENTER FOR INTERNATIONAL SECURITY AND COOPERATION (CISAC),
STANFORD UNIVERSITY “MALCOLM HARKINS GETS IT.IN HIS NEW BOOK
MALCOLM OUTLINES THE MAJOR FORCES CHANGING THE INFORMATION SECURITY RISK
LANDSCAPE FROM A BIG PICTURE PERSPECTIVE, AND THEN GOES ON TO OFFER
EFFECTIVE METHODS OF MANAGING THAT RISK FROM A PRACTITIONER S VIEWPOINT.
THE COMBINATION MAKES THIS BOOK UNIQUE AND A MUST READ FOR ANYONE
INTERESTED IN IT RISK. DENNIS DEVLIN AVP, INFORMATION SECURITY AND
COMPLIANCE, THE GEORGE WASHINGTON UNIVERSITY “MANAGING RISK AND
INFORMATION SECURITY IS THE FIRST-TO-READ, MUST-READ BOOK ON INFORMATION
SECURITY FOR C-SUITE EXECUTIVES. IT IS ACCESSIBLE, UNDERSTANDABLE AND
ACTIONABLE. NO SKY-IS-FALLING SCARE TACTICS, NO TECHNO-BABBLE – JUST
STRAIGHT TALK ABOUT A CRITICALLY IMPORTANT SUBJECT.THERE IS NO BETTER
PRIMER ON THE ECONOMICS, ERGONOMICS AND PSYCHO-BEHAVIOURALS OF SECURITY
THAN THIS.” THORNTON MAY, FUTURIST, EXECUTIVE DIRECTOR & DEAN, IT
LEADERSHIP ACADEMY “MANAGING RISK AND INFORMATION SECURITY IS A
WAKE-UP CALL FOR INFORMATION SECURITY EXECUTIVES AND A RAY OF LIGHT FOR
BUSINESS LEADERS. IT EQUIPS ORGANIZATIONS WITH THE KNOWLEDGE REQUIRED
TO TRANSFORM THEIR SECURITY PROGRAMS FROM A “CULTURE OF NO” TO ONE
FOCUSED ON AGILITY, VALUE AND COMPETITIVENESS. UNLIKE OTHER
PUBLICATIONS, MALCOLM PROVIDES CLEAR AND IMMEDIATELY APPLICABLE
SOLUTIONS TO OPTIMALLY BALANCE THE FREQUENTLY OPPOSING NEEDS OF RISK
REDUCTION AND BUSINESS GROWTH. THIS BOOK SHOULD BE REQUIRED READING FOR
ANYONE CURRENTLY SERVING IN, OR SEEKING TO ACHIEVE, THE ROLE OF CHIEF
INFORMATION SECURITY OFFICER.” JAMIL FARSHCHI, SENIOR BUSINESS LEADER
OF STRATEGIC PLANNING AND INITIATIVES, VISA “FOR TOO MANY
YEARS, BUSINESS AND SECURITY – EITHER REAL OR IMAGINED – WERE AT
ODDS.IN MANAGING RISK AND INFORMATION SECURITY: PROTECT TO ENABLE, YOU
GET WHAT YOU EXPECT – REAL LIFE PRACTICAL WAYS TO BREAK LOGJAMS, HAVE
SECURITY ACTUALLY ENABLE BUSINESS, AND MARRIES SECURITY ARCHITECTURE AND
BUSINESS ARCHITECTURE. WHY THIS BOOK? IT S WRITTEN BY A PRACTITIONER,
AND NOT JUST ANY PRACTITIONER, ONE OF THE LEADING MINDS IN SECURITY
TODAY.” JOHN STEWART, CHIEF SECURITY OFFICER, CISCO “THIS BOOK
IS AN INVALUABLE GUIDE TO HELP SECURITY PROFESSIONALS ADDRESS RISK IN
NEW WAYS IN THIS ALARMINGLY FAST CHANGING ENVIRONMENT. PACKED WITH
EXAMPLES WHICH MAKES IT A PLEASURE TO READ, THE BOOK CAPTURES PRACTICAL
WAYS A FORWARD THINKING CISO CAN TURN INFORMATION SECURITY INTO A
COMPETITIVE ADVANTAGE FOR THEIR BUSINESS. THIS BOOK PROVIDES A NEW
FRAMEWORK FOR MANAGING RISK IN AN ENTERTAINING AND THOUGHT PROVOKING
WAY. THIS WILL CHANGE THE WAY SECURITY PROFESSIONALS WORK WITH THEIR
BUSINESS LEADERS, AND HELP GET PRODUCTS TO MARKET FASTER. THE 6
IRREFUTABLE LAWS OF INFORMATION SECURITY SHOULD BE ON A STONE PLAQUE ON
THE DESK OF EVERY SECURITY PROFESSIONAL.” STEVEN PROCTOR, VP, AUDIT &
RISK MANAGEMENT, FLEXTRONICS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Harkins, Malcolm |
author_GND | (DE-588)1034181076 |
author_facet | Harkins, Malcolm |
author_role | aut |
author_sort | Harkins, Malcolm |
author_variant | m h mh |
building | Verbundindex |
bvnumber | BV040977975 |
classification_rvk | ST 276 |
collection | ZDB-2-CWD |
ctrlnum | (OCoLC)843455388 (DE-599)BVBBV040977975 |
discipline | Informatik |
doi_str_mv | 10.1007/978-1-4302-5114-9 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02384nmm a2200493 c 4500</leader><controlfield tag="001">BV040977975</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">130502s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781430251149</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-4302-5114-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4302-5114-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)843455388</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040977975</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M347</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-384</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Harkins, Malcolm</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1034181076</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Managing Risk and Information Security</subfield><subfield code="b">Protect to Enable</subfield><subfield code="c">by Malcolm Harkins</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berkeley, CA</subfield><subfield code="b">Apress</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVII, 152 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-1-4302-5113-2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4302-5114-9</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025956032&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-CWD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025956032</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4302-5114-9</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4302-5114-9</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4302-5114-9</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4302-5114-9</subfield><subfield code="l">FNU01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4302-5114-9</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4302-5114-9</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4302-5114-9</subfield><subfield code="l">UBA01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV040977975 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T11:58:48Z |
institution | BVB |
isbn | 9781430251149 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025956032 |
oclc_num | 843455388 |
open_access_boolean | |
owner | DE-M347 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-1049 DE-92 DE-898 DE-BY-UBR DE-1049 DE-384 |
owner_facet | DE-M347 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-1049 DE-92 DE-898 DE-BY-UBR DE-1049 DE-384 |
physical | 1 Online-Ressource (XVII, 152 p.) |
psigel | ZDB-2-CWD |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Apress |
record_format | marc |
spellingShingle | Harkins, Malcolm Managing Risk and Information Security Protect to Enable Kryptologie (DE-588)4033329-2 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)4274324-2 |
title | Managing Risk and Information Security Protect to Enable |
title_auth | Managing Risk and Information Security Protect to Enable |
title_exact_search | Managing Risk and Information Security Protect to Enable |
title_full | Managing Risk and Information Security Protect to Enable by Malcolm Harkins |
title_fullStr | Managing Risk and Information Security Protect to Enable by Malcolm Harkins |
title_full_unstemmed | Managing Risk and Information Security Protect to Enable by Malcolm Harkins |
title_short | Managing Risk and Information Security |
title_sort | managing risk and information security protect to enable |
title_sub | Protect to Enable |
topic | Kryptologie (DE-588)4033329-2 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Kryptologie Computersicherheit |
url | https://doi.org/10.1007/978-1-4302-5114-9 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025956032&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT harkinsmalcolm managingriskandinformationsecurityprotecttoenable |