Safeguarding critical e-documents: implementing a program for securing confidential information assets
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hoboken, New Jersey
John Wiley & Sons, Inc.
2012
|
Schlagworte: | |
Online-Zugang: | DE-861 DE-473 URL des Erstveröffentlichers |
Beschreibung: | Includes index "Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records. Managers and public officials are looking for technology and information governance solutions to "information leakage" in an understandable, concise format. Safeguarding Critical E-Documents provides a road map for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard their internal electronic documents and private communications. Provides practical, step-by-step guidance on protecting sensitive and confidential documents--even if they leave the organization electronically or on portable devices Presents a blueprint for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard internal electronic documents and private communications Offers a concise format for securing your organizations from information leakage In light of the recent WikiLeaks revelations, governments and businesses have heightened awareness of the vulnerability of confidential internal documents and communications. Timely and relevant, Safeguarding Critical E-Documents shows how to keep internal documents from getting into the wrong hands and weakening your competitive position, or possible damaging your organization's reputation and leading to costly investigations"-- Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource |
ISBN: | 1118282272 1118282817 1118286871 1119204909 9780470873939 9781118159088 9781118282274 9781118282816 9781118286876 9781119204909 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043393934 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 160222s2012 |||| o||u| ||||||eng d | ||
020 | |a 1118282272 |9 1-118-28227-2 | ||
020 | |a 1118282817 |9 1-118-28281-7 | ||
020 | |a 1118286871 |9 1-118-28687-1 | ||
020 | |a 1119204909 |c electronic bk. |9 1-119-20490-9 | ||
020 | |a 9780470873939 |c pbk. |9 978-0-470-87393-9 | ||
020 | |a 9781118159088 |c pbk. |9 978-1-118-15908-8 | ||
020 | |a 9781118282274 |9 978-1-118-28227-4 | ||
020 | |a 9781118282816 |9 978-1-118-28281-6 | ||
020 | |a 9781118286876 |9 978-1-118-28687-6 | ||
020 | |a 9781119204909 |c electronic bk. |9 978-1-119-20490-9 | ||
024 | 7 | |a 10.1002/9781119204909 |2 doi | |
035 | |a (ZDB-35-WIC)ocn771652961 | ||
035 | |a (OCoLC)771652961 | ||
035 | |a (DE-599)BVBBV043393934 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-861 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a DO 1250 |0 (DE-625)19753:761 |2 rvk | ||
084 | |a DP 4000 |0 (DE-625)19842:12010 |2 rvk | ||
100 | 1 | |a Smallwood, Robert F. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Safeguarding critical e-documents |b implementing a program for securing confidential information assets |c Robert F. Smallwood |
264 | 1 | |a Hoboken, New Jersey |b John Wiley & Sons, Inc. |c 2012 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a "Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records. Managers and public officials are looking for technology and information governance solutions to "information leakage" in an understandable, concise format. Safeguarding Critical E-Documents provides a road map for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard their internal electronic documents and private communications. Provides practical, step-by-step guidance on protecting sensitive and confidential documents--even if they leave the organization electronically or on portable devices Presents a blueprint for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard internal electronic documents and private communications Offers a concise format for securing your organizations from information leakage In light of the recent WikiLeaks revelations, governments and businesses have heightened awareness of the vulnerability of confidential internal documents and communications. Timely and relevant, Safeguarding Critical E-Documents shows how to keep internal documents from getting into the wrong hands and weakening your competitive position, or possible damaging your organization's reputation and leading to costly investigations"-- | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Cyberspace / Security measures | |
650 | 4 | |a Database security | |
650 | 4 | |a Electronic records | |
650 | 7 | |a BUSINESS & ECONOMICS / Information Management |2 bisacsh | |
650 | 7 | |a Business |2 fast | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Computer security | |
650 | 4 | |a Cyberspace / Security measures | |
650 | 4 | |a Database security | |
650 | 4 | |a Electronic records | |
650 | 0 | 7 | |a Lesefähigkeit |0 (DE-588)4167435-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Schulleistungsmessung |0 (DE-588)4077202-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Lesefähigkeit |0 (DE-588)4167435-2 |D s |
689 | 0 | 1 | |a Schulleistungsmessung |0 (DE-588)4077202-0 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 1-118-15908-X |
856 | 4 | 0 | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119204909 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WIC | ||
940 | 1 | |q UBG_PDA_WIC | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119204909 |l DE-861 |p ZDB-35-WIC |q FRO_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119204909 |l DE-473 |p ZDB-35-WIC |q UBG_PDA_WIC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805069242479935488 |
---|---|
adam_text | |
any_adam_object | |
author | Smallwood, Robert F. |
author_facet | Smallwood, Robert F. |
author_role | aut |
author_sort | Smallwood, Robert F. |
author_variant | r f s rf rfs |
building | Verbundindex |
bvnumber | BV043393934 |
classification_rvk | DO 1250 DP 4000 |
collection | ZDB-35-WIC |
ctrlnum | (ZDB-35-WIC)ocn771652961 (OCoLC)771652961 (DE-599)BVBBV043393934 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Pädagogik Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV043393934</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160222s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118282272</subfield><subfield code="9">1-118-28227-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118282817</subfield><subfield code="9">1-118-28281-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118286871</subfield><subfield code="9">1-118-28687-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119204909</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-119-20490-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470873939</subfield><subfield code="c">pbk.</subfield><subfield code="9">978-0-470-87393-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118159088</subfield><subfield code="c">pbk.</subfield><subfield code="9">978-1-118-15908-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118282274</subfield><subfield code="9">978-1-118-28227-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118282816</subfield><subfield code="9">978-1-118-28281-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118286876</subfield><subfield code="9">978-1-118-28687-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119204909</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-119-20490-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9781119204909</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WIC)ocn771652961</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)771652961</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043393934</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-861</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DO 1250</subfield><subfield code="0">(DE-625)19753:761</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DP 4000</subfield><subfield code="0">(DE-625)19842:12010</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Smallwood, Robert F.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Safeguarding critical e-documents</subfield><subfield code="b">implementing a program for securing confidential information assets</subfield><subfield code="c">Robert F. Smallwood</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, New Jersey</subfield><subfield code="b">John Wiley & Sons, Inc.</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records. Managers and public officials are looking for technology and information governance solutions to "information leakage" in an understandable, concise format. Safeguarding Critical E-Documents provides a road map for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard their internal electronic documents and private communications. Provides practical, step-by-step guidance on protecting sensitive and confidential documents--even if they leave the organization electronically or on portable devices Presents a blueprint for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard internal electronic documents and private communications Offers a concise format for securing your organizations from information leakage In light of the recent WikiLeaks revelations, governments and businesses have heightened awareness of the vulnerability of confidential internal documents and communications. Timely and relevant, Safeguarding Critical E-Documents shows how to keep internal documents from getting into the wrong hands and weakening your competitive position, or possible damaging your organization's reputation and leading to costly investigations"--</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic records</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Information Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic records</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Lesefähigkeit</subfield><subfield code="0">(DE-588)4167435-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Schulleistungsmessung</subfield><subfield code="0">(DE-588)4077202-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Lesefähigkeit</subfield><subfield code="0">(DE-588)4167435-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Schulleistungsmessung</subfield><subfield code="0">(DE-588)4077202-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">1-118-15908-X</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119204909</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">UBG_PDA_WIC</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119204909</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FRO_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119204909</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBG_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043393934 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T04:02:55Z |
institution | BVB |
isbn | 1118282272 1118282817 1118286871 1119204909 9780470873939 9781118159088 9781118282274 9781118282816 9781118286876 9781119204909 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028812518 |
oclc_num | 771652961 |
open_access_boolean | |
owner | DE-861 |
owner_facet | DE-861 |
physical | 1 Online-Ressource |
psigel | ZDB-35-WIC UBG_PDA_WIC ZDB-35-WIC FRO_PDA_WIC ZDB-35-WIC UBG_PDA_WIC |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | John Wiley & Sons, Inc. |
record_format | marc |
spelling | Smallwood, Robert F. Verfasser aut Safeguarding critical e-documents implementing a program for securing confidential information assets Robert F. Smallwood Hoboken, New Jersey John Wiley & Sons, Inc. 2012 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Includes index "Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records. Managers and public officials are looking for technology and information governance solutions to "information leakage" in an understandable, concise format. Safeguarding Critical E-Documents provides a road map for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard their internal electronic documents and private communications. Provides practical, step-by-step guidance on protecting sensitive and confidential documents--even if they leave the organization electronically or on portable devices Presents a blueprint for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard internal electronic documents and private communications Offers a concise format for securing your organizations from information leakage In light of the recent WikiLeaks revelations, governments and businesses have heightened awareness of the vulnerability of confidential internal documents and communications. Timely and relevant, Safeguarding Critical E-Documents shows how to keep internal documents from getting into the wrong hands and weakening your competitive position, or possible damaging your organization's reputation and leading to costly investigations"-- Includes bibliographical references and index Computer security Cyberspace / Security measures Database security Electronic records BUSINESS & ECONOMICS / Information Management bisacsh Business fast Wirtschaft Lesefähigkeit (DE-588)4167435-2 gnd rswk-swf Schulleistungsmessung (DE-588)4077202-0 gnd rswk-swf Lesefähigkeit (DE-588)4167435-2 s Schulleistungsmessung (DE-588)4077202-0 s DE-604 Erscheint auch als Druckausgabe 1-118-15908-X https://onlinelibrary.wiley.com/doi/book/10.1002/9781119204909 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Smallwood, Robert F. Safeguarding critical e-documents implementing a program for securing confidential information assets Computer security Cyberspace / Security measures Database security Electronic records BUSINESS & ECONOMICS / Information Management bisacsh Business fast Wirtschaft Lesefähigkeit (DE-588)4167435-2 gnd Schulleistungsmessung (DE-588)4077202-0 gnd |
subject_GND | (DE-588)4167435-2 (DE-588)4077202-0 |
title | Safeguarding critical e-documents implementing a program for securing confidential information assets |
title_auth | Safeguarding critical e-documents implementing a program for securing confidential information assets |
title_exact_search | Safeguarding critical e-documents implementing a program for securing confidential information assets |
title_full | Safeguarding critical e-documents implementing a program for securing confidential information assets Robert F. Smallwood |
title_fullStr | Safeguarding critical e-documents implementing a program for securing confidential information assets Robert F. Smallwood |
title_full_unstemmed | Safeguarding critical e-documents implementing a program for securing confidential information assets Robert F. Smallwood |
title_short | Safeguarding critical e-documents |
title_sort | safeguarding critical e documents implementing a program for securing confidential information assets |
title_sub | implementing a program for securing confidential information assets |
topic | Computer security Cyberspace / Security measures Database security Electronic records BUSINESS & ECONOMICS / Information Management bisacsh Business fast Wirtschaft Lesefähigkeit (DE-588)4167435-2 gnd Schulleistungsmessung (DE-588)4077202-0 gnd |
topic_facet | Computer security Cyberspace / Security measures Database security Electronic records BUSINESS & ECONOMICS / Information Management Business Wirtschaft Lesefähigkeit Schulleistungsmessung |
url | https://onlinelibrary.wiley.com/doi/book/10.1002/9781119204909 |
work_keys_str_mv | AT smallwoodrobertf safeguardingcriticaledocumentsimplementingaprogramforsecuringconfidentialinformationassets |