Computer security handbook: volume 1
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Hoboken, New Jersey
Wiley
[2014]
|
Ausgabe: | sixth edition |
Schlagworte: | |
Online-Zugang: | FHA01 FHI01 FRO01 FWS01 FWS02 UBG01 UBM01 UBR01 UPA01 Volltext |
Beschreibung: | Includes bibliographical references and index Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written for professionals and college students, it provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more. This essential and highly-regarded r |
Beschreibung: | 1 Online-Ressource (1216 Seiten) |
ISBN: | 9781118851678 9781118851791 9781118851746 9781118851722 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043396316 | ||
003 | DE-604 | ||
005 | 20231222 | ||
007 | cr|uuu---uuuuu | ||
008 | 160222s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781118851678 |c Online |9 978-1-118-85167-8 | ||
020 | |a 9781118851791 |c electronic bk |9 978-1-118-85179-1 | ||
020 | |a 9781118851746 |c electronic bk |9 978-1-118-85174-6 | ||
020 | |a 9781118851722 |c pdf |9 978-1-118-85172-2 | ||
024 | 7 | |a 10.1002/9781118851678 |2 doi | |
035 | |a (ZDB-35-WIC)ocn862041532 | ||
035 | |a (ZDB-30-PAD)EBC1652940 | ||
035 | |a (ZDB-89-EBL)EBL1652940 | ||
035 | |a (ZDB-38-EBR)ebr10851665 | ||
035 | |a (OCoLC)862041532 | ||
035 | |a (DE-599)BVBBV043396316 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-Aug4 |a DE-573 |a DE-861 |a DE-19 |a DE-739 |a DE-863 |a DE-862 |a DE-355 | ||
082 | 0 | |a 658.4/78 |2 23 | |
245 | 1 | 0 | |a Computer security handbook |b volume 1 |c edited by Seymour Bosworth, Michel E. Kabay, Eric Whyne |
250 | |a sixth edition | ||
264 | 1 | |a Hoboken, New Jersey |b Wiley |c [2014] | |
300 | |a 1 Online-Ressource (1216 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written for professionals and college students, it provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more. This essential and highly-regarded r | ||
650 | 7 | |a BUSINESS & ECONOMICS / Industrial Management |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Management |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Management Science |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Organizational Behavior |2 bisacsh | |
650 | 7 | |a Electronic data processing departments / Security measures |2 fast | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data protection | |
650 | 4 | |a Electronic data processing departments / Security measures | |
650 | 4 | |a Information technology / Security measures | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Electronic data processing departments / Security measures | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |8 2\p |5 DE-604 | |
700 | 1 | |a Bosworth, Seymour |e Sonstige |4 oth | |
700 | 1 | |a Kabay, Michel E. |e Sonstige |4 oth | |
700 | 1 | |a Whyne, Eric |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-1-118-13410-8 |
856 | 4 | 0 | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118851678 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WIC |a ZDB-30-PAD |a ZDB-30-PBE |a ZDB-38-ESG |a ZDB-35-UBC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028814900 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118851678 |l FHA01 |p ZDB-35-WIC |q FHA_PDA_WIC_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118851678 |l FHI01 |p ZDB-35-WIC |q FHI_PDA_WIC_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118851678 |l FRO01 |p ZDB-35-WIC |q FRO_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118851678 |l FWS01 |p ZDB-35-WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118851678 |l FWS02 |p ZDB-35-WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118851678 |l UBG01 |p ZDB-35-WIC |q UBG_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118851678 |l UBM01 |p ZDB-35-WIC |q UBM_PDA_WIC_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118851678 |l UBR01 |p ZDB-35-UBC |q UBR EBS Auswahl 2023 |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118851678 |l UPA01 |p ZDB-35-WIC |q UPA_PDA_WIC_Kauf |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 1027252 |
---|---|
_version_ | 1824553662868881408 |
any_adam_object | |
building | Verbundindex |
bvnumber | BV043396316 |
collection | ZDB-35-WIC ZDB-30-PAD ZDB-30-PBE ZDB-38-ESG ZDB-35-UBC |
ctrlnum | (ZDB-35-WIC)ocn862041532 (ZDB-30-PAD)EBC1652940 (ZDB-89-EBL)EBL1652940 (ZDB-38-EBR)ebr10851665 (OCoLC)862041532 (DE-599)BVBBV043396316 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
edition | sixth edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04664nmm a2200793zc 4500</leader><controlfield tag="001">BV043396316</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20231222 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160222s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118851678</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-118-85167-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118851791</subfield><subfield code="c">electronic bk</subfield><subfield code="9">978-1-118-85179-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118851746</subfield><subfield code="c">electronic bk</subfield><subfield code="9">978-1-118-85174-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118851722</subfield><subfield code="c">pdf</subfield><subfield code="9">978-1-118-85172-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9781118851678</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WIC)ocn862041532</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC1652940</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL1652940</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr10851665</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)862041532</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043396316</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer security handbook</subfield><subfield code="b">volume 1</subfield><subfield code="c">edited by Seymour Bosworth, Michel E. Kabay, Eric Whyne</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">sixth edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, New Jersey</subfield><subfield code="b">Wiley</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1216 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written for professionals and college students, it provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more. This essential and highly-regarded r</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Industrial Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Management Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Organizational Behavior</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic data processing departments / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data processing departments / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data processing departments / Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bosworth, Seymour</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kabay, Michel E.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Whyne, Eric</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-1-118-13410-8</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118851678</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield><subfield code="a">ZDB-30-PAD</subfield><subfield code="a">ZDB-30-PBE</subfield><subfield code="a">ZDB-38-ESG</subfield><subfield code="a">ZDB-35-UBC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028814900</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118851678</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FHA_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118851678</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FHI_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118851678</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FRO_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118851678</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118851678</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118851678</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBG_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118851678</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBM_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118851678</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-35-UBC</subfield><subfield code="q">UBR EBS Auswahl 2023</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118851678</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UPA_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV043396316 |
illustrated | Not Illustrated |
indexdate | 2025-02-20T06:39:27Z |
institution | BVB |
isbn | 9781118851678 9781118851791 9781118851746 9781118851722 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028814900 |
oclc_num | 862041532 |
open_access_boolean | |
owner | DE-Aug4 DE-573 DE-861 DE-19 DE-BY-UBM DE-739 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-355 DE-BY-UBR |
owner_facet | DE-Aug4 DE-573 DE-861 DE-19 DE-BY-UBM DE-739 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (1216 Seiten) |
psigel | ZDB-35-WIC ZDB-30-PAD ZDB-30-PBE ZDB-38-ESG ZDB-35-UBC ZDB-35-WIC FHA_PDA_WIC_Kauf ZDB-35-WIC FHI_PDA_WIC_Kauf ZDB-35-WIC FRO_PDA_WIC ZDB-35-WIC UBG_PDA_WIC ZDB-35-WIC UBM_PDA_WIC_Kauf ZDB-35-UBC UBR EBS Auswahl 2023 ZDB-35-WIC UPA_PDA_WIC_Kauf |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Wiley |
record_format | marc |
spellingShingle | Computer security handbook volume 1 BUSINESS & ECONOMICS / Industrial Management bisacsh BUSINESS & ECONOMICS / Management bisacsh BUSINESS & ECONOMICS / Management Science bisacsh BUSINESS & ECONOMICS / Organizational Behavior bisacsh Electronic data processing departments / Security measures fast Computer security Data protection Electronic data processing departments / Security measures Information technology / Security measures Wirtschaft Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4274324-2 (DE-588)4143413-4 |
title | Computer security handbook volume 1 |
title_auth | Computer security handbook volume 1 |
title_exact_search | Computer security handbook volume 1 |
title_full | Computer security handbook volume 1 edited by Seymour Bosworth, Michel E. Kabay, Eric Whyne |
title_fullStr | Computer security handbook volume 1 edited by Seymour Bosworth, Michel E. Kabay, Eric Whyne |
title_full_unstemmed | Computer security handbook volume 1 edited by Seymour Bosworth, Michel E. Kabay, Eric Whyne |
title_short | Computer security handbook |
title_sort | computer security handbook volume 1 |
title_sub | volume 1 |
topic | BUSINESS & ECONOMICS / Industrial Management bisacsh BUSINESS & ECONOMICS / Management bisacsh BUSINESS & ECONOMICS / Management Science bisacsh BUSINESS & ECONOMICS / Organizational Behavior bisacsh Electronic data processing departments / Security measures fast Computer security Data protection Electronic data processing departments / Security measures Information technology / Security measures Wirtschaft Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | BUSINESS & ECONOMICS / Industrial Management BUSINESS & ECONOMICS / Management BUSINESS & ECONOMICS / Management Science BUSINESS & ECONOMICS / Organizational Behavior Electronic data processing departments / Security measures Computer security Data protection Information technology / Security measures Wirtschaft Datensicherung Computersicherheit Aufsatzsammlung |
url | https://onlinelibrary.wiley.com/doi/book/10.1002/9781118851678 |
work_keys_str_mv | AT bosworthseymour computersecurityhandbookvolume1 AT kabaymichele computersecurityhandbookvolume1 AT whyneeric computersecurityhandbookvolume1 |