The international handbook of computer security:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Chicago, Ill.
Glenlake Pub.
©2000
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes index Chapter 1 - Organizational Policy - 1 -- - Chapter 2 - Physical Security and Data Preservation - 11 -- - Chapter 3 - Hardware Security - 33 -- - Chapter 4 - Software Security - 67 -- - Chapter 5 - Personnel Security - 109 -- - Chapter 6 - Network Security - 117 -- - Appendix 6.A - Commercial Firewalls - 145 -- - Appendix 6.B - Firewall Resellers - 153 -- - Appendix 6.C - Public Domain, Shareware, etc - 163 -- - Chapter 7 - Security Policy - 165 -- - Appendix 7.A - Sources of Information Security Policies - 178 -- - Appendix 7.B - Sample Computer Policy - 179 -- - Chapter 8 - Contingency Planning - 191 -- - Appendix 8.A - Business Impact Analysis Worksheet - 213 -- - Appendix 8.B - Communications Assessment Questionnaire - 215 -- - Appendix 8.C - Insurance Recovery Program - 217 -- - Appendix 8.D - Making an Insurance Claim - 219 -- - Chapter 9 - Auditing and Legal Issues - 221 -- - Appendix - Security Software - 235 The international handbook of computer security is written primarily to help business executives and information systems/computer professionals protect computer systems and data from a myriad of internal and external threats. The book addresses a wide range of computer security issues. It is intended to provide practical and thorough guidance in the quagmire of computers, technology, networks, and software. Among the major topics discussed are : company security policies, data preservation and protection, personnel management and security, legal and auditing planning and control, network security, internal and external systems, physical security procedures, hardware and software protection, contingency planning |
Beschreibung: | 1 Online-Ressource (xii, 260 pages) |
ISBN: | 0814405797 0814424554 1135961735 1579582591 1888998857 9780814405796 9780814424551 9781135961732 9781579582593 9781888998856 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043145391 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2000 |||| o||u| ||||||eng d | ||
020 | |a 0814405797 |9 0-8144-0579-7 | ||
020 | |a 0814424554 |c electronic bk. |9 0-8144-2455-4 | ||
020 | |a 1135961735 |c electronic bk. |9 1-135-96173-5 | ||
020 | |a 1579582591 |9 1-57958-259-1 | ||
020 | |a 1888998857 |9 1-888998-85-7 | ||
020 | |a 9780814405796 |9 978-0-8144-0579-6 | ||
020 | |a 9780814424551 |c electronic bk. |9 978-0-8144-2455-1 | ||
020 | |a 9781135961732 |c electronic bk. |9 978-1-135-96173-2 | ||
020 | |a 9781579582593 |9 978-1-57958-259-3 | ||
020 | |a 9781888998856 |9 978-1-888998-85-6 | ||
035 | |a (OCoLC)45843766 | ||
035 | |a (DE-599)BVBBV043145391 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 21 | |
100 | 1 | |a Shim, Jae K. |e Verfasser |4 aut | |
245 | 1 | 0 | |a The international handbook of computer security |c Jae K. Shim [and others] |
264 | 1 | |a Chicago, Ill. |b Glenlake Pub. |c ©2000 | |
300 | |a 1 Online-Ressource (xii, 260 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Chapter 1 - Organizational Policy - 1 -- - Chapter 2 - Physical Security and Data Preservation - 11 -- - Chapter 3 - Hardware Security - 33 -- - Chapter 4 - Software Security - 67 -- - Chapter 5 - Personnel Security - 109 -- - Chapter 6 - Network Security - 117 -- - Appendix 6.A - Commercial Firewalls - 145 -- - Appendix 6.B - Firewall Resellers - 153 -- - Appendix 6.C - Public Domain, Shareware, etc - 163 -- - Chapter 7 - Security Policy - 165 -- - Appendix 7.A - Sources of Information Security Policies - 178 -- - Appendix 7.B - Sample Computer Policy - 179 -- - Chapter 8 - Contingency Planning - 191 -- - Appendix 8.A - Business Impact Analysis Worksheet - 213 -- - Appendix 8.B - Communications Assessment Questionnaire - 215 -- - Appendix 8.C - Insurance Recovery Program - 217 -- - Appendix 8.D - Making an Insurance Claim - 219 -- - Chapter 9 - Auditing and Legal Issues - 221 -- - Appendix - Security Software - 235 | ||
500 | |a The international handbook of computer security is written primarily to help business executives and information systems/computer professionals protect computer systems and data from a myriad of internal and external threats. The book addresses a wide range of computer security issues. It is intended to provide practical and thorough guidance in the quagmire of computers, technology, networks, and software. Among the major topics discussed are : company security policies, data preservation and protection, personnel management and security, legal and auditing planning and control, network security, internal and external systems, physical security procedures, hardware and software protection, contingency planning | ||
650 | 4 | |a Computer security / Handbooks, manuals, etc | |
650 | 4 | |a Data protection / Handbooks, manuals, etc | |
650 | 4 | |a Computer networks / Safety measures / Handbooks, manuals, etc | |
650 | 4 | |a Sécurité informatique / Guides, manuels, etc | |
650 | 4 | |a Protection de l'information (Informatique) / Guides, manuels, etc | |
650 | 4 | |a Réseaux d'ordinateurs / Sécurité / Mesures / Guides, manuels, etc | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Internet / Security measures |2 fast | |
650 | 7 | |a SEGURANÇA EM COMPUTADOR. |2 larpcal | |
650 | 7 | |a REDES DE COMPUTADORES. |2 larpcal | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Internet |x Security measures | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
700 | 1 | |a Shim, Jae K. |e Sonstige |4 oth | |
700 | 1 | |a Qureshi, Anique A. |e Sonstige |4 oth | |
700 | 1 | |a Siegel, Joel G. |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=46506 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028569582 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=46506 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=46506 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175599158165504 |
---|---|
any_adam_object | |
author | Shim, Jae K. |
author_facet | Shim, Jae K. |
author_role | aut |
author_sort | Shim, Jae K. |
author_variant | j k s jk jks |
building | Verbundindex |
bvnumber | BV043145391 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)45843766 (DE-599)BVBBV043145391 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05044nmm a2200793zc 4500</leader><controlfield tag="001">BV043145391</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2000 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0814405797</subfield><subfield code="9">0-8144-0579-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0814424554</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-8144-2455-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1135961735</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-135-96173-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1579582591</subfield><subfield code="9">1-57958-259-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1888998857</subfield><subfield code="9">1-888998-85-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780814405796</subfield><subfield code="9">978-0-8144-0579-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780814424551</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-8144-2455-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781135961732</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-135-96173-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781579582593</subfield><subfield code="9">978-1-57958-259-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781888998856</subfield><subfield code="9">978-1-888998-85-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)45843766</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043145391</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shim, Jae K.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The international handbook of computer security</subfield><subfield code="c">Jae K. Shim [and others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Chicago, Ill.</subfield><subfield code="b">Glenlake Pub.</subfield><subfield code="c">©2000</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xii, 260 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Chapter 1 - Organizational Policy - 1 -- - Chapter 2 - Physical Security and Data Preservation - 11 -- - Chapter 3 - Hardware Security - 33 -- - Chapter 4 - Software Security - 67 -- - Chapter 5 - Personnel Security - 109 -- - Chapter 6 - Network Security - 117 -- - Appendix 6.A - Commercial Firewalls - 145 -- - Appendix 6.B - Firewall Resellers - 153 -- - Appendix 6.C - Public Domain, Shareware, etc - 163 -- - Chapter 7 - Security Policy - 165 -- - Appendix 7.A - Sources of Information Security Policies - 178 -- - Appendix 7.B - Sample Computer Policy - 179 -- - Chapter 8 - Contingency Planning - 191 -- - Appendix 8.A - Business Impact Analysis Worksheet - 213 -- - Appendix 8.B - Communications Assessment Questionnaire - 215 -- - Appendix 8.C - Insurance Recovery Program - 217 -- - Appendix 8.D - Making an Insurance Claim - 219 -- - Chapter 9 - Auditing and Legal Issues - 221 -- - Appendix - Security Software - 235</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The international handbook of computer security is written primarily to help business executives and information systems/computer professionals protect computer systems and data from a myriad of internal and external threats. The book addresses a wide range of computer security issues. It is intended to provide practical and thorough guidance in the quagmire of computers, technology, networks, and software. Among the major topics discussed are : company security policies, data preservation and protection, personnel management and security, legal and auditing planning and control, network security, internal and external systems, physical security procedures, hardware and software protection, contingency planning</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security / Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection / Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Safety measures / Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique / Guides, manuels, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique) / Guides, manuels, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs / Sécurité / Mesures / Guides, manuels, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SEGURANÇA EM COMPUTADOR.</subfield><subfield code="2">larpcal</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">REDES DE COMPUTADORES.</subfield><subfield code="2">larpcal</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shim, Jae K.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Qureshi, Anique A.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Siegel, Joel G.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=46506</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028569582</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=46506</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=46506</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043145391 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:18:51Z |
institution | BVB |
isbn | 0814405797 0814424554 1135961735 1579582591 1888998857 9780814405796 9780814424551 9781135961732 9781579582593 9781888998856 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028569582 |
oclc_num | 45843766 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xii, 260 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2000 |
publishDateSearch | 2000 |
publishDateSort | 2000 |
publisher | Glenlake Pub. |
record_format | marc |
spelling | Shim, Jae K. Verfasser aut The international handbook of computer security Jae K. Shim [and others] Chicago, Ill. Glenlake Pub. ©2000 1 Online-Ressource (xii, 260 pages) txt rdacontent c rdamedia cr rdacarrier Includes index Chapter 1 - Organizational Policy - 1 -- - Chapter 2 - Physical Security and Data Preservation - 11 -- - Chapter 3 - Hardware Security - 33 -- - Chapter 4 - Software Security - 67 -- - Chapter 5 - Personnel Security - 109 -- - Chapter 6 - Network Security - 117 -- - Appendix 6.A - Commercial Firewalls - 145 -- - Appendix 6.B - Firewall Resellers - 153 -- - Appendix 6.C - Public Domain, Shareware, etc - 163 -- - Chapter 7 - Security Policy - 165 -- - Appendix 7.A - Sources of Information Security Policies - 178 -- - Appendix 7.B - Sample Computer Policy - 179 -- - Chapter 8 - Contingency Planning - 191 -- - Appendix 8.A - Business Impact Analysis Worksheet - 213 -- - Appendix 8.B - Communications Assessment Questionnaire - 215 -- - Appendix 8.C - Insurance Recovery Program - 217 -- - Appendix 8.D - Making an Insurance Claim - 219 -- - Chapter 9 - Auditing and Legal Issues - 221 -- - Appendix - Security Software - 235 The international handbook of computer security is written primarily to help business executives and information systems/computer professionals protect computer systems and data from a myriad of internal and external threats. The book addresses a wide range of computer security issues. It is intended to provide practical and thorough guidance in the quagmire of computers, technology, networks, and software. Among the major topics discussed are : company security policies, data preservation and protection, personnel management and security, legal and auditing planning and control, network security, internal and external systems, physical security procedures, hardware and software protection, contingency planning Computer security / Handbooks, manuals, etc Data protection / Handbooks, manuals, etc Computer networks / Safety measures / Handbooks, manuals, etc Sécurité informatique / Guides, manuels, etc Protection de l'information (Informatique) / Guides, manuels, etc Réseaux d'ordinateurs / Sécurité / Mesures / Guides, manuels, etc COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Internet / Security measures fast SEGURANÇA EM COMPUTADOR. larpcal REDES DE COMPUTADORES. larpcal Computer security Computer networks Security measures Internet Security measures Computersicherheit (DE-588)4274324-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Datensicherung (DE-588)4011144-1 s 2\p DE-604 Shim, Jae K. Sonstige oth Qureshi, Anique A. Sonstige oth Siegel, Joel G. Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=46506 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Shim, Jae K. The international handbook of computer security Computer security / Handbooks, manuals, etc Data protection / Handbooks, manuals, etc Computer networks / Safety measures / Handbooks, manuals, etc Sécurité informatique / Guides, manuels, etc Protection de l'information (Informatique) / Guides, manuels, etc Réseaux d'ordinateurs / Sécurité / Mesures / Guides, manuels, etc COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Internet / Security measures fast SEGURANÇA EM COMPUTADOR. larpcal REDES DE COMPUTADORES. larpcal Computer security Computer networks Security measures Internet Security measures Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4011144-1 |
title | The international handbook of computer security |
title_auth | The international handbook of computer security |
title_exact_search | The international handbook of computer security |
title_full | The international handbook of computer security Jae K. Shim [and others] |
title_fullStr | The international handbook of computer security Jae K. Shim [and others] |
title_full_unstemmed | The international handbook of computer security Jae K. Shim [and others] |
title_short | The international handbook of computer security |
title_sort | the international handbook of computer security |
topic | Computer security / Handbooks, manuals, etc Data protection / Handbooks, manuals, etc Computer networks / Safety measures / Handbooks, manuals, etc Sécurité informatique / Guides, manuels, etc Protection de l'information (Informatique) / Guides, manuels, etc Réseaux d'ordinateurs / Sécurité / Mesures / Guides, manuels, etc COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Internet / Security measures fast SEGURANÇA EM COMPUTADOR. larpcal REDES DE COMPUTADORES. larpcal Computer security Computer networks Security measures Internet Security measures Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Computer security / Handbooks, manuals, etc Data protection / Handbooks, manuals, etc Computer networks / Safety measures / Handbooks, manuals, etc Sécurité informatique / Guides, manuels, etc Protection de l'information (Informatique) / Guides, manuels, etc Réseaux d'ordinateurs / Sécurité / Mesures / Guides, manuels, etc COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer security Internet / Security measures SEGURANÇA EM COMPUTADOR. REDES DE COMPUTADORES. Computer networks Security measures Internet Security measures Computersicherheit Datensicherung |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=46506 |
work_keys_str_mv | AT shimjaek theinternationalhandbookofcomputersecurity AT qureshianiquea theinternationalhandbookofcomputersecurity AT siegeljoelg theinternationalhandbookofcomputersecurity |