Document Security: Protecting Physical and Electronic Content
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Springfield
Charles C Thomas Publisher, LTD
2007
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Print version record |
Beschreibung: | 1 online resource (181 pages) |
ISBN: | 0398085358 9780398085353 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043034895 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151120s2007 |||| o||u| ||||||eng d | ||
020 | |a 0398085358 |c electronic bk. |9 0-398-08535-8 | ||
020 | |a 9780398085353 |c electronic bk. |9 978-0-398-08535-3 | ||
035 | |a (OCoLC)689996262 | ||
035 | |a (DE-599)BVBBV043034895 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 | |
100 | 1 | |a Mendell, Ronald L. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Document Security |b Protecting Physical and Electronic Content |
264 | 1 | |a Springfield |b Charles C Thomas Publisher, LTD |c 2007 | |
300 | |a 1 online resource (181 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
505 | 8 | |a DOCUMENT SECURITY; CONTENTS; Chapter 1: METADATA; Chapter 2: WEB-FACING DOCUMENTS; Chapter 3: INFORMATION LEAKAGE INBUSINESS CHANNELS; Chapter 4: DIGITAL DEVICE THEFT; Chapter 5: MAGNETIC, ELECTRONIC, AND OPTICAL PERSISTENCE; Chapter 6: SECURING PAPER AND PHYSICAL DOCUMENTS; Chapter 7: FORENSICS; Chapter 8: ANTI-FORENSICS; Chapter 9: EVALUATING WEB PAGES; Chapter 10: DOCUMENT FORGERY; Appendix; INDEX. | |
505 | 8 | |a This text identifies common pitfalls in document security and suggests remedies to prevent its occurrence. It strives to alert an audience of managers, security professionals, and workers who come in regular contact with sensitive information. Recognition of how sensitive documents can violate the principle of confidentiality is the primary focus of the book. Chapter 1 discusses metadata in documents. Paying attention to this issue can reduce unintentional release of sensitive information. Chapter 2 explores Web-facing documents and how search engines like Google can uncover sensitive data in | |
650 | 4 | |a Computer Science / IT. | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 4 | |a Informatik | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks |x Security measures | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Mendell, Ronald L |t . Document Security : Protecting Physical and Electronic Content |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=446143 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028459545 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=446143 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=446143 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175394146877440 |
---|---|
any_adam_object | |
author | Mendell, Ronald L. |
author_facet | Mendell, Ronald L. |
author_role | aut |
author_sort | Mendell, Ronald L. |
author_variant | r l m rl rlm |
building | Verbundindex |
bvnumber | BV043034895 |
collection | ZDB-4-EBA |
contents | DOCUMENT SECURITY; CONTENTS; Chapter 1: METADATA; Chapter 2: WEB-FACING DOCUMENTS; Chapter 3: INFORMATION LEAKAGE INBUSINESS CHANNELS; Chapter 4: DIGITAL DEVICE THEFT; Chapter 5: MAGNETIC, ELECTRONIC, AND OPTICAL PERSISTENCE; Chapter 6: SECURING PAPER AND PHYSICAL DOCUMENTS; Chapter 7: FORENSICS; Chapter 8: ANTI-FORENSICS; Chapter 9: EVALUATING WEB PAGES; Chapter 10: DOCUMENT FORGERY; Appendix; INDEX. This text identifies common pitfalls in document security and suggests remedies to prevent its occurrence. It strives to alert an audience of managers, security professionals, and workers who come in regular contact with sensitive information. Recognition of how sensitive documents can violate the principle of confidentiality is the primary focus of the book. Chapter 1 discusses metadata in documents. Paying attention to this issue can reduce unintentional release of sensitive information. Chapter 2 explores Web-facing documents and how search engines like Google can uncover sensitive data in |
ctrlnum | (OCoLC)689996262 (DE-599)BVBBV043034895 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02973nmm a2200481zc 4500</leader><controlfield tag="001">BV043034895</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151120s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0398085358</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-398-08535-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780398085353</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-398-08535-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)689996262</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043034895</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Mendell, Ronald L.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Document Security</subfield><subfield code="b">Protecting Physical and Electronic Content</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Springfield</subfield><subfield code="b">Charles C Thomas Publisher, LTD</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (181 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">DOCUMENT SECURITY; CONTENTS; Chapter 1: METADATA; Chapter 2: WEB-FACING DOCUMENTS; Chapter 3: INFORMATION LEAKAGE INBUSINESS CHANNELS; Chapter 4: DIGITAL DEVICE THEFT; Chapter 5: MAGNETIC, ELECTRONIC, AND OPTICAL PERSISTENCE; Chapter 6: SECURING PAPER AND PHYSICAL DOCUMENTS; Chapter 7: FORENSICS; Chapter 8: ANTI-FORENSICS; Chapter 9: EVALUATING WEB PAGES; Chapter 10: DOCUMENT FORGERY; Appendix; INDEX.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">This text identifies common pitfalls in document security and suggests remedies to prevent its occurrence. It strives to alert an audience of managers, security professionals, and workers who come in regular contact with sensitive information. Recognition of how sensitive documents can violate the principle of confidentiality is the primary focus of the book. Chapter 1 discusses metadata in documents. Paying attention to this issue can reduce unintentional release of sensitive information. Chapter 2 explores Web-facing documents and how search engines like Google can uncover sensitive data in</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science / IT.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Mendell, Ronald L</subfield><subfield code="t">. Document Security : Protecting Physical and Electronic Content</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=446143</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028459545</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=446143</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=446143</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043034895 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:15:35Z |
institution | BVB |
isbn | 0398085358 9780398085353 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028459545 |
oclc_num | 689996262 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 online resource (181 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Charles C Thomas Publisher, LTD |
record_format | marc |
spelling | Mendell, Ronald L. Verfasser aut Document Security Protecting Physical and Electronic Content Springfield Charles C Thomas Publisher, LTD 2007 1 online resource (181 pages) txt rdacontent c rdamedia cr rdacarrier Print version record DOCUMENT SECURITY; CONTENTS; Chapter 1: METADATA; Chapter 2: WEB-FACING DOCUMENTS; Chapter 3: INFORMATION LEAKAGE INBUSINESS CHANNELS; Chapter 4: DIGITAL DEVICE THEFT; Chapter 5: MAGNETIC, ELECTRONIC, AND OPTICAL PERSISTENCE; Chapter 6: SECURING PAPER AND PHYSICAL DOCUMENTS; Chapter 7: FORENSICS; Chapter 8: ANTI-FORENSICS; Chapter 9: EVALUATING WEB PAGES; Chapter 10: DOCUMENT FORGERY; Appendix; INDEX. This text identifies common pitfalls in document security and suggests remedies to prevent its occurrence. It strives to alert an audience of managers, security professionals, and workers who come in regular contact with sensitive information. Recognition of how sensitive documents can violate the principle of confidentiality is the primary focus of the book. Chapter 1 discusses metadata in documents. Paying attention to this issue can reduce unintentional release of sensitive information. Chapter 2 explores Web-facing documents and how search engines like Google can uncover sensitive data in Computer Science / IT. COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Informatik Computer security Computer networks Security measures Erscheint auch als Druck-Ausgabe Mendell, Ronald L . Document Security : Protecting Physical and Electronic Content http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=446143 Aggregator Volltext |
spellingShingle | Mendell, Ronald L. Document Security Protecting Physical and Electronic Content DOCUMENT SECURITY; CONTENTS; Chapter 1: METADATA; Chapter 2: WEB-FACING DOCUMENTS; Chapter 3: INFORMATION LEAKAGE INBUSINESS CHANNELS; Chapter 4: DIGITAL DEVICE THEFT; Chapter 5: MAGNETIC, ELECTRONIC, AND OPTICAL PERSISTENCE; Chapter 6: SECURING PAPER AND PHYSICAL DOCUMENTS; Chapter 7: FORENSICS; Chapter 8: ANTI-FORENSICS; Chapter 9: EVALUATING WEB PAGES; Chapter 10: DOCUMENT FORGERY; Appendix; INDEX. This text identifies common pitfalls in document security and suggests remedies to prevent its occurrence. It strives to alert an audience of managers, security professionals, and workers who come in regular contact with sensitive information. Recognition of how sensitive documents can violate the principle of confidentiality is the primary focus of the book. Chapter 1 discusses metadata in documents. Paying attention to this issue can reduce unintentional release of sensitive information. Chapter 2 explores Web-facing documents and how search engines like Google can uncover sensitive data in Computer Science / IT. COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Informatik Computer security Computer networks Security measures |
title | Document Security Protecting Physical and Electronic Content |
title_auth | Document Security Protecting Physical and Electronic Content |
title_exact_search | Document Security Protecting Physical and Electronic Content |
title_full | Document Security Protecting Physical and Electronic Content |
title_fullStr | Document Security Protecting Physical and Electronic Content |
title_full_unstemmed | Document Security Protecting Physical and Electronic Content |
title_short | Document Security |
title_sort | document security protecting physical and electronic content |
title_sub | Protecting Physical and Electronic Content |
topic | Computer Science / IT. COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Informatik Computer security Computer networks Security measures |
topic_facet | Computer Science / IT. COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer security Informatik Computer networks Security measures |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=446143 |
work_keys_str_mv | AT mendellronaldl documentsecurityprotectingphysicalandelectroniccontent |