Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berkeley, CA
Apress
2016
|
Schlagworte: | |
Online-Zugang: | FHM01 FHN01 FHO01 FHR01 FKE01 FWS01 FWS02 UBW01 Volltext |
Beschreibung: | 1 Online-Ressource (XIX, 195 Seiten) 13 Illustrationen, 8 Illustrationen (farbig) |
ISBN: | 9781484220535 |
DOI: | 10.1007/978-1-4842-2053-5 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043746764 | ||
003 | DE-604 | ||
005 | 20161117 | ||
007 | cr|uuu---uuuuu | ||
008 | 160901s2016 |||| o||u| ||||||eng d | ||
020 | |a 9781484220535 |c Online |9 978-1-4842-2053-5 | ||
024 | 7 | |a 10.1007/978-1-4842-2053-5 |2 doi | |
035 | |a (ZDB-2-CWD)9781484220535 | ||
035 | |a (OCoLC)958179728 | ||
035 | |a (DE-599)BVBBV043746764 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-898 |a DE-M347 |a DE-859 |a DE-863 |a DE-20 |a DE-1051 |a DE-92 |a DE-862 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Wittkop, Jeremy |e Verfasser |0 (DE-588)1112683968 |4 aut | |
245 | 1 | 0 | |a Building a Comprehensive IT Security Program |b Practical Guidelines and Best Practices |c by Jeremy Wittkop |
264 | 1 | |a Berkeley, CA |b Apress |c 2016 | |
300 | |a 1 Online-Ressource (XIX, 195 Seiten) |b 13 Illustrationen, 8 Illustrationen (farbig) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 4 | |a Computer science | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data Structures, Cryptology and Information Theory | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-1-4842-2052-8 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4842-2053-5 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-CWD | ||
940 | 1 | |q ZDB-2-CWD_2016 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-029158402 | ||
966 | e | |u https://doi.org/10.1007/978-1-4842-2053-5 |l FHM01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-2053-5 |l FHN01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-2053-5 |l FHO01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-2053-5 |l FHR01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-2053-5 |l FKE01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-2053-5 |l FWS01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-2053-5 |l FWS02 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-2053-5 |l UBW01 |p ZDB-2-CWD |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 625734 |
---|---|
_version_ | 1806180150111371264 |
any_adam_object | |
author | Wittkop, Jeremy |
author_GND | (DE-588)1112683968 |
author_facet | Wittkop, Jeremy |
author_role | aut |
author_sort | Wittkop, Jeremy |
author_variant | j w jw |
building | Verbundindex |
bvnumber | BV043746764 |
classification_rvk | ST 277 |
collection | ZDB-2-CWD |
ctrlnum | (ZDB-2-CWD)9781484220535 (OCoLC)958179728 (DE-599)BVBBV043746764 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-1-4842-2053-5 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02603nmm a2200589zc 4500</leader><controlfield tag="001">BV043746764</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20161117 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160901s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484220535</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-4842-2053-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4842-2053-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-CWD)9781484220535</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)958179728</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043746764</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-898</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-862</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wittkop, Jeremy</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1112683968</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Building a Comprehensive IT Security Program</subfield><subfield code="b">Practical Guidelines and Best Practices</subfield><subfield code="c">by Jeremy Wittkop</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berkeley, CA</subfield><subfield code="b">Apress</subfield><subfield code="c">2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIX, 195 Seiten)</subfield><subfield code="b">13 Illustrationen, 8 Illustrationen (farbig)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures, Cryptology and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-1-4842-2052-8</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4842-2053-5</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-CWD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-CWD_2016</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029158402</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-2053-5</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-2053-5</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-2053-5</subfield><subfield code="l">FHO01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-2053-5</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-2053-5</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-2053-5</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-2053-5</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-2053-5</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043746764 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T12:20:19Z |
institution | BVB |
isbn | 9781484220535 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029158402 |
oclc_num | 958179728 |
open_access_boolean | |
owner | DE-898 DE-BY-UBR DE-M347 DE-859 DE-863 DE-BY-FWS DE-20 DE-1051 DE-92 DE-862 DE-BY-FWS |
owner_facet | DE-898 DE-BY-UBR DE-M347 DE-859 DE-863 DE-BY-FWS DE-20 DE-1051 DE-92 DE-862 DE-BY-FWS |
physical | 1 Online-Ressource (XIX, 195 Seiten) 13 Illustrationen, 8 Illustrationen (farbig) |
psigel | ZDB-2-CWD ZDB-2-CWD_2016 |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Apress |
record_format | marc |
spellingShingle | Wittkop, Jeremy Building a Comprehensive IT Security Program Practical Guidelines and Best Practices Computer science Computer security Data structures (Computer science) Computer Science Systems and Data Security Data Structures, Cryptology and Information Theory Informatik Informatik (DE-588)4026894-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4026894-9 (DE-588)4274324-2 |
title | Building a Comprehensive IT Security Program Practical Guidelines and Best Practices |
title_auth | Building a Comprehensive IT Security Program Practical Guidelines and Best Practices |
title_exact_search | Building a Comprehensive IT Security Program Practical Guidelines and Best Practices |
title_full | Building a Comprehensive IT Security Program Practical Guidelines and Best Practices by Jeremy Wittkop |
title_fullStr | Building a Comprehensive IT Security Program Practical Guidelines and Best Practices by Jeremy Wittkop |
title_full_unstemmed | Building a Comprehensive IT Security Program Practical Guidelines and Best Practices by Jeremy Wittkop |
title_short | Building a Comprehensive IT Security Program |
title_sort | building a comprehensive it security program practical guidelines and best practices |
title_sub | Practical Guidelines and Best Practices |
topic | Computer science Computer security Data structures (Computer science) Computer Science Systems and Data Security Data Structures, Cryptology and Information Theory Informatik Informatik (DE-588)4026894-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer science Computer security Data structures (Computer science) Computer Science Systems and Data Security Data Structures, Cryptology and Information Theory Informatik Computersicherheit |
url | https://doi.org/10.1007/978-1-4842-2053-5 |
work_keys_str_mv | AT wittkopjeremy buildingacomprehensiveitsecurityprogrampracticalguidelinesandbestpractices |