Breakdowns in Computer Security: Commentary and Analysis
Breakdowns in Computer Security: Commentary and Analysis is a compendium of 100 genuine incidents that have taken place in the past three or so years. The book describes computer breakdown incidents during the years 1988-1990 and provides to each incident a short comment indicating where improvement...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
London
Elsevier Science
2014
|
Schlagworte: | |
Online-Zugang: | FAW01 |
Zusammenfassung: | Breakdowns in Computer Security: Commentary and Analysis is a compendium of 100 genuine incidents that have taken place in the past three or so years. The book describes computer breakdown incidents during the years 1988-1990 and provides to each incident a short comment indicating where improvements could have been made to alleviate or prevent the more damaging aspects of the problem. The types of generic risks (i.e. line tapping, espionage, communications failure, theft, malicious programming, hacking, disaster, and virus) that exist around IT systems into which each of the incidents described has been categorized are also considered. The book provides a complete analysis of the overall situation in respect of risks and threats to assets due to computer systems. References on computer weekly publications are also provided. Senior management personnel with responsibilities for data processing operations and company IT personnel will find this book beneficial |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 online resource (105 pages) |
ISBN: | 9781483106076 9781853840241 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043616433 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160616s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781483106076 |9 978-1-4831-0607-6 | ||
020 | |a 9781853840241 |c Print |9 978-1-85384-024-1 | ||
035 | |a (ZDB-30-PQE)EBC1901206 | ||
035 | |a (ZDB-89-EBL)EBL1901206 | ||
035 | |a (ZDB-38-EBR)ebr11003823 | ||
035 | |a (OCoLC)893980398 | ||
035 | |a (DE-599)BVBBV043616433 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 658.478 | |
100 | 1 | |a Rentell, Michael E. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Breakdowns in Computer Security |b Commentary and Analysis |
264 | 1 | |a London |b Elsevier Science |c 2014 | |
264 | 4 | |c © 1991 | |
300 | |a 1 online resource (105 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | |a Breakdowns in Computer Security: Commentary and Analysis is a compendium of 100 genuine incidents that have taken place in the past three or so years. The book describes computer breakdown incidents during the years 1988-1990 and provides to each incident a short comment indicating where improvements could have been made to alleviate or prevent the more damaging aspects of the problem. The types of generic risks (i.e. line tapping, espionage, communications failure, theft, malicious programming, hacking, disaster, and virus) that exist around IT systems into which each of the incidents described has been categorized are also considered. The book provides a complete analysis of the overall situation in respect of risks and threats to assets due to computer systems. References on computer weekly publications are also provided. Senior management personnel with responsibilities for data processing operations and company IT personnel will find this book beneficial | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Electronic data processing departments -- Security measures | |
700 | 1 | |a Jenner, Peter M. |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Rentell, Michael E |t Breakdowns in Computer Security : Commentary and Analysis |
912 | |a ZDB-30-PQE |a ZDB-33-ESD |a ZDB-33-EBS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029030492 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781483106076 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176358666928128 |
---|---|
any_adam_object | |
author | Rentell, Michael E. |
author_facet | Rentell, Michael E. |
author_role | aut |
author_sort | Rentell, Michael E. |
author_variant | m e r me mer |
building | Verbundindex |
bvnumber | BV043616433 |
collection | ZDB-30-PQE ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-30-PQE)EBC1901206 (ZDB-89-EBL)EBL1901206 (ZDB-38-EBR)ebr11003823 (OCoLC)893980398 (DE-599)BVBBV043616433 |
dewey-full | 658.478 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.478 |
dewey-search | 658.478 |
dewey-sort | 3658.478 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02493nmm a2200421zc 4500</leader><controlfield tag="001">BV043616433</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160616s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781483106076</subfield><subfield code="9">978-1-4831-0607-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781853840241</subfield><subfield code="c">Print</subfield><subfield code="9">978-1-85384-024-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC1901206</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL1901206</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr11003823</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)893980398</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043616433</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.478</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rentell, Michael E.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Breakdowns in Computer Security</subfield><subfield code="b">Commentary and Analysis</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">Elsevier Science</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 1991</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (105 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Breakdowns in Computer Security: Commentary and Analysis is a compendium of 100 genuine incidents that have taken place in the past three or so years. The book describes computer breakdown incidents during the years 1988-1990 and provides to each incident a short comment indicating where improvements could have been made to alleviate or prevent the more damaging aspects of the problem. The types of generic risks (i.e. line tapping, espionage, communications failure, theft, malicious programming, hacking, disaster, and virus) that exist around IT systems into which each of the incidents described has been categorized are also considered. The book provides a complete analysis of the overall situation in respect of risks and threats to assets due to computer systems. References on computer weekly publications are also provided. Senior management personnel with responsibilities for data processing operations and company IT personnel will find this book beneficial</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data processing departments -- Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jenner, Peter M.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Rentell, Michael E</subfield><subfield code="t">Breakdowns in Computer Security : Commentary and Analysis</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029030492</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781483106076</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043616433 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:30:55Z |
institution | BVB |
isbn | 9781483106076 9781853840241 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029030492 |
oclc_num | 893980398 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 online resource (105 pages) |
psigel | ZDB-30-PQE ZDB-33-ESD ZDB-33-EBS ZDB-33-ESD FAW_PDA_ESD |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Elsevier Science |
record_format | marc |
spelling | Rentell, Michael E. Verfasser aut Breakdowns in Computer Security Commentary and Analysis London Elsevier Science 2014 © 1991 1 online resource (105 pages) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources Breakdowns in Computer Security: Commentary and Analysis is a compendium of 100 genuine incidents that have taken place in the past three or so years. The book describes computer breakdown incidents during the years 1988-1990 and provides to each incident a short comment indicating where improvements could have been made to alleviate or prevent the more damaging aspects of the problem. The types of generic risks (i.e. line tapping, espionage, communications failure, theft, malicious programming, hacking, disaster, and virus) that exist around IT systems into which each of the incidents described has been categorized are also considered. The book provides a complete analysis of the overall situation in respect of risks and threats to assets due to computer systems. References on computer weekly publications are also provided. Senior management personnel with responsibilities for data processing operations and company IT personnel will find this book beneficial Computer security Electronic data processing departments -- Security measures Jenner, Peter M. Sonstige oth Erscheint auch als Druck-Ausgabe Rentell, Michael E Breakdowns in Computer Security : Commentary and Analysis |
spellingShingle | Rentell, Michael E. Breakdowns in Computer Security Commentary and Analysis Computer security Electronic data processing departments -- Security measures |
title | Breakdowns in Computer Security Commentary and Analysis |
title_auth | Breakdowns in Computer Security Commentary and Analysis |
title_exact_search | Breakdowns in Computer Security Commentary and Analysis |
title_full | Breakdowns in Computer Security Commentary and Analysis |
title_fullStr | Breakdowns in Computer Security Commentary and Analysis |
title_full_unstemmed | Breakdowns in Computer Security Commentary and Analysis |
title_short | Breakdowns in Computer Security |
title_sort | breakdowns in computer security commentary and analysis |
title_sub | Commentary and Analysis |
topic | Computer security Electronic data processing departments -- Security measures |
topic_facet | Computer security Electronic data processing departments -- Security measures |
work_keys_str_mv | AT rentellmichaele breakdownsincomputersecuritycommentaryandanalysis AT jennerpeterm breakdownsincomputersecuritycommentaryandanalysis |