Managing Information System Security:
The book demonstrates that the solutions to security in information systems are to be found through adopting appropriate management strategies and mechanisms, rather than merely seeking technical solutions. The arguments are supported by case studies from the health care and local government sectors
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
London
Macmillan Education UK
1997
|
Schriftenreihe: | Information Systems Series
|
Schlagworte: | |
Online-Zugang: | BTU01 Volltext |
Zusammenfassung: | The book demonstrates that the solutions to security in information systems are to be found through adopting appropriate management strategies and mechanisms, rather than merely seeking technical solutions. The arguments are supported by case studies from the health care and local government sectors |
Beschreibung: | 1 Online-Ressource (VIII, 224 p) |
ISBN: | 9781349144549 |
DOI: | 10.1007/978-1-349-14454-9 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045184957 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 180912s1997 |||| o||u| ||||||eng d | ||
020 | |a 9781349144549 |9 978-1-349-14454-9 | ||
024 | 7 | |a 10.1007/978-1-349-14454-9 |2 doi | |
035 | |a (ZDB-2-ENG)978-1-349-14454-9 | ||
035 | |a (OCoLC)1053794234 | ||
035 | |a (DE-599)BVBBV045184957 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-634 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Dhillon, Gurpreet |e Verfasser |4 aut | |
245 | 1 | 0 | |a Managing Information System Security |c by Gurpreet Dhillon |
264 | 1 | |a London |b Macmillan Education UK |c 1997 | |
300 | |a 1 Online-Ressource (VIII, 224 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Information Systems Series | |
520 | |a The book demonstrates that the solutions to security in information systems are to be found through adopting appropriate management strategies and mechanisms, rather than merely seeking technical solutions. The arguments are supported by case studies from the health care and local government sectors | ||
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data protection | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780333692608 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781349144556 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-349-14454-9 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-ENG | ||
940 | 1 | |q ZDB-2-ENG_Archiv | |
999 | |a oai:aleph.bib-bvb.de:BVB01-030574135 | ||
966 | e | |u https://doi.org/10.1007/978-1-349-14454-9 |l BTU01 |p ZDB-2-ENG |q ZDB-2-ENG_Archiv |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804178874277298176 |
---|---|
any_adam_object | |
author | Dhillon, Gurpreet |
author_facet | Dhillon, Gurpreet |
author_role | aut |
author_sort | Dhillon, Gurpreet |
author_variant | g d gd |
building | Verbundindex |
bvnumber | BV045184957 |
classification_rvk | ST 276 |
collection | ZDB-2-ENG |
ctrlnum | (ZDB-2-ENG)978-1-349-14454-9 (OCoLC)1053794234 (DE-599)BVBBV045184957 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-1-349-14454-9 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01752nmm a2200421zc 4500</leader><controlfield tag="001">BV045184957</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180912s1997 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781349144549</subfield><subfield code="9">978-1-349-14454-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-349-14454-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-ENG)978-1-349-14454-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1053794234</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045184957</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Dhillon, Gurpreet</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Managing Information System Security</subfield><subfield code="c">by Gurpreet Dhillon</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">Macmillan Education UK</subfield><subfield code="c">1997</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (VIII, 224 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Information Systems Series</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The book demonstrates that the solutions to security in information systems are to be found through adopting appropriate management strategies and mechanisms, rather than merely seeking technical solutions. The arguments are supported by case studies from the health care and local government sectors</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780333692608</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781349144556</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-349-14454-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-ENG_Archiv</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030574135</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-349-14454-9</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="q">ZDB-2-ENG_Archiv</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV045184957 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:10:54Z |
institution | BVB |
isbn | 9781349144549 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030574135 |
oclc_num | 1053794234 |
open_access_boolean | |
owner | DE-634 |
owner_facet | DE-634 |
physical | 1 Online-Ressource (VIII, 224 p) |
psigel | ZDB-2-ENG ZDB-2-ENG_Archiv ZDB-2-ENG ZDB-2-ENG_Archiv |
publishDate | 1997 |
publishDateSearch | 1997 |
publishDateSort | 1997 |
publisher | Macmillan Education UK |
record_format | marc |
series2 | Information Systems Series |
spelling | Dhillon, Gurpreet Verfasser aut Managing Information System Security by Gurpreet Dhillon London Macmillan Education UK 1997 1 Online-Ressource (VIII, 224 p) txt rdacontent c rdamedia cr rdacarrier Information Systems Series The book demonstrates that the solutions to security in information systems are to be found through adopting appropriate management strategies and mechanisms, rather than merely seeking technical solutions. The arguments are supported by case studies from the health care and local government sectors Systems and Data Security Data protection Erscheint auch als Druck-Ausgabe 9780333692608 Erscheint auch als Druck-Ausgabe 9781349144556 https://doi.org/10.1007/978-1-349-14454-9 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Dhillon, Gurpreet Managing Information System Security Systems and Data Security Data protection |
title | Managing Information System Security |
title_auth | Managing Information System Security |
title_exact_search | Managing Information System Security |
title_full | Managing Information System Security by Gurpreet Dhillon |
title_fullStr | Managing Information System Security by Gurpreet Dhillon |
title_full_unstemmed | Managing Information System Security by Gurpreet Dhillon |
title_short | Managing Information System Security |
title_sort | managing information system security |
topic | Systems and Data Security Data protection |
topic_facet | Systems and Data Security Data protection |
url | https://doi.org/10.1007/978-1-349-14454-9 |
work_keys_str_mv | AT dhillongurpreet managinginformationsystemsecurity |