Enterprise information security and privacy:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Boston
Artech House
2009
|
Schriftenreihe: | Artech House information security and privacy series
|
Schlagworte: | |
Beschreibung: | Print version record |
Beschreibung: | 1 online resource (xxiv, 231 pages) illustrations |
ISBN: | 9781596931909 1596931906 9781596931916 1596931914 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045343240 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181206s2009 |||| o||u| ||||||eng d | ||
015 | |a GBA938405 |2 dnb | ||
020 | |a 9781596931909 |9 978-1-59693-190-9 | ||
020 | |a 1596931906 |9 1-59693-190-6 | ||
020 | |a 9781596931916 |9 978-1-59693-191-6 | ||
020 | |a 1596931914 |9 1-59693-191-4 | ||
035 | |a (ZDB-4-ENC)ocn434595684 | ||
035 | |a (OCoLC)434595684 | ||
035 | |a (DE-599)BVBBV045343240 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 658.4/78 |2 22 | |
245 | 1 | 0 | |a Enterprise information security and privacy |c C. Warren Axelrod, Jennifer L. Bayuk, Daniel Schutzer, editors |
264 | 1 | |a Boston |b Artech House |c 2009 | |
300 | |a 1 online resource (xxiv, 231 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Artech House information security and privacy series | |
500 | |a Print version record | ||
505 | 8 | |a Here's a unique and practical book that addresses the rapidly growing problem of information security, privacy, and secrecy threats and vulnerabilities. This authoritative resource helps professionals understand what really needs to be done to protect sensitive data and systems and how to comply with the burgeoning roster of data protection laws and regulations. The book examines the effectiveness and weaknesses of current approaches and guides you towards practical methods and doable processes that can bring about real improvement in the overall security environment. Readers gain insight into the latest security and privacy trends, learn how to determine and mitigate risks, and discover the specific dangers and responses regarding the most critical sectors of a modern economy. -- Publisher description | |
650 | 7 | |a BUSINESS & ECONOMICS / Workplace Culture |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Corporate Governance |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Leadership |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Organizational Development |2 bisacsh | |
650 | 7 | |a Business enterprises / Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 7 | |a Information technology / Security measures |2 fast | |
650 | 4 | |a Business enterprises |x Computer networks |x Security measures |a Information technology |x Security measures |a Computer security |a Data protection | |
650 | 0 | 7 | |a Betriebliches Informationssystem |0 (DE-588)4069386-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Betriebliches Informationssystem |0 (DE-588)4069386-7 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Axelrod, C. Warren |e Sonstige |4 oth | |
700 | 1 | |a Bayuk, Jennifer L. |e Sonstige |4 oth | |
700 | 1 | |a Schutzer, Daniel |d 1940- |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |t Enterprise information security and privacy |d Boston : Artech House, 2009 |z 1596931906 |z 9781596931909 |
912 | |a ZDB-4-ENC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030729944 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804179161808371712 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV045343240 |
collection | ZDB-4-ENC |
contents | Here's a unique and practical book that addresses the rapidly growing problem of information security, privacy, and secrecy threats and vulnerabilities. This authoritative resource helps professionals understand what really needs to be done to protect sensitive data and systems and how to comply with the burgeoning roster of data protection laws and regulations. The book examines the effectiveness and weaknesses of current approaches and guides you towards practical methods and doable processes that can bring about real improvement in the overall security environment. Readers gain insight into the latest security and privacy trends, learn how to determine and mitigate risks, and discover the specific dangers and responses regarding the most critical sectors of a modern economy. -- Publisher description |
ctrlnum | (ZDB-4-ENC)ocn434595684 (OCoLC)434595684 (DE-599)BVBBV045343240 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03274nmm a2200577zc 4500</leader><controlfield tag="001">BV045343240</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181206s2009 |||| o||u| ||||||eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA938405</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781596931909</subfield><subfield code="9">978-1-59693-190-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1596931906</subfield><subfield code="9">1-59693-190-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781596931916</subfield><subfield code="9">978-1-59693-191-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1596931914</subfield><subfield code="9">1-59693-191-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ENC)ocn434595684</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)434595684</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045343240</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Enterprise information security and privacy</subfield><subfield code="c">C. Warren Axelrod, Jennifer L. Bayuk, Daniel Schutzer, editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Artech House</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxiv, 231 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Artech House information security and privacy series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Here's a unique and practical book that addresses the rapidly growing problem of information security, privacy, and secrecy threats and vulnerabilities. This authoritative resource helps professionals understand what really needs to be done to protect sensitive data and systems and how to comply with the burgeoning roster of data protection laws and regulations. The book examines the effectiveness and weaknesses of current approaches and guides you towards practical methods and doable processes that can bring about real improvement in the overall security environment. Readers gain insight into the latest security and privacy trends, learn how to determine and mitigate risks, and discover the specific dangers and responses regarding the most critical sectors of a modern economy. -- Publisher description</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Workplace Culture</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Corporate Governance</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Leadership</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Organizational Development</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business enterprises / Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield><subfield code="a">Computer security</subfield><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Betriebliches Informationssystem</subfield><subfield code="0">(DE-588)4069386-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Betriebliches Informationssystem</subfield><subfield code="0">(DE-588)4069386-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Axelrod, C. Warren</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bayuk, Jennifer L.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schutzer, Daniel</subfield><subfield code="d">1940-</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="t">Enterprise information security and privacy</subfield><subfield code="d">Boston : Artech House, 2009</subfield><subfield code="z">1596931906</subfield><subfield code="z">9781596931909</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ENC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030729944</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV045343240 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:15:28Z |
institution | BVB |
isbn | 9781596931909 1596931906 9781596931916 1596931914 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030729944 |
oclc_num | 434595684 |
open_access_boolean | |
physical | 1 online resource (xxiv, 231 pages) illustrations |
psigel | ZDB-4-ENC |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Artech House |
record_format | marc |
series2 | Artech House information security and privacy series |
spelling | Enterprise information security and privacy C. Warren Axelrod, Jennifer L. Bayuk, Daniel Schutzer, editors Boston Artech House 2009 1 online resource (xxiv, 231 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Artech House information security and privacy series Print version record Here's a unique and practical book that addresses the rapidly growing problem of information security, privacy, and secrecy threats and vulnerabilities. This authoritative resource helps professionals understand what really needs to be done to protect sensitive data and systems and how to comply with the burgeoning roster of data protection laws and regulations. The book examines the effectiveness and weaknesses of current approaches and guides you towards practical methods and doable processes that can bring about real improvement in the overall security environment. Readers gain insight into the latest security and privacy trends, learn how to determine and mitigate risks, and discover the specific dangers and responses regarding the most critical sectors of a modern economy. -- Publisher description BUSINESS & ECONOMICS / Workplace Culture bisacsh BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh Business enterprises / Computer networks / Security measures fast Computer security fast Data protection fast Information technology / Security measures fast Business enterprises Computer networks Security measures Information technology Security measures Computer security Data protection Betriebliches Informationssystem (DE-588)4069386-7 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Betriebliches Informationssystem (DE-588)4069386-7 s Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Axelrod, C. Warren Sonstige oth Bayuk, Jennifer L. Sonstige oth Schutzer, Daniel 1940- Sonstige oth Erscheint auch als Druck-Ausgabe Enterprise information security and privacy Boston : Artech House, 2009 1596931906 9781596931909 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Enterprise information security and privacy Here's a unique and practical book that addresses the rapidly growing problem of information security, privacy, and secrecy threats and vulnerabilities. This authoritative resource helps professionals understand what really needs to be done to protect sensitive data and systems and how to comply with the burgeoning roster of data protection laws and regulations. The book examines the effectiveness and weaknesses of current approaches and guides you towards practical methods and doable processes that can bring about real improvement in the overall security environment. Readers gain insight into the latest security and privacy trends, learn how to determine and mitigate risks, and discover the specific dangers and responses regarding the most critical sectors of a modern economy. -- Publisher description BUSINESS & ECONOMICS / Workplace Culture bisacsh BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh Business enterprises / Computer networks / Security measures fast Computer security fast Data protection fast Information technology / Security measures fast Business enterprises Computer networks Security measures Information technology Security measures Computer security Data protection Betriebliches Informationssystem (DE-588)4069386-7 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4069386-7 (DE-588)4274324-2 |
title | Enterprise information security and privacy |
title_auth | Enterprise information security and privacy |
title_exact_search | Enterprise information security and privacy |
title_full | Enterprise information security and privacy C. Warren Axelrod, Jennifer L. Bayuk, Daniel Schutzer, editors |
title_fullStr | Enterprise information security and privacy C. Warren Axelrod, Jennifer L. Bayuk, Daniel Schutzer, editors |
title_full_unstemmed | Enterprise information security and privacy C. Warren Axelrod, Jennifer L. Bayuk, Daniel Schutzer, editors |
title_short | Enterprise information security and privacy |
title_sort | enterprise information security and privacy |
topic | BUSINESS & ECONOMICS / Workplace Culture bisacsh BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh Business enterprises / Computer networks / Security measures fast Computer security fast Data protection fast Information technology / Security measures fast Business enterprises Computer networks Security measures Information technology Security measures Computer security Data protection Betriebliches Informationssystem (DE-588)4069386-7 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | BUSINESS & ECONOMICS / Workplace Culture BUSINESS & ECONOMICS / Corporate Governance BUSINESS & ECONOMICS / Leadership BUSINESS & ECONOMICS / Organizational Development Business enterprises / Computer networks / Security measures Computer security Data protection Information technology / Security measures Business enterprises Computer networks Security measures Information technology Security measures Computer security Data protection Betriebliches Informationssystem Computersicherheit |
work_keys_str_mv | AT axelrodcwarren enterpriseinformationsecurityandprivacy AT bayukjenniferl enterpriseinformationsecurityandprivacy AT schutzerdaniel enterpriseinformationsecurityandprivacy |