Managerial guide for handling cyber-terrorism and information warfare:
This book defines the organizational security measures that will decrease an organization's information system vulnerabilities to all types of attacks
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pa
IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)
c2005
|
Schlagworte: | |
Online-Zugang: | DE-898 DE-706 DE-1050 DE-1049 DE-83 Volltext |
Zusammenfassung: | This book defines the organizational security measures that will decrease an organization's information system vulnerabilities to all types of attacks |
Beschreibung: | Includes bibliographical references and index. - Title from PDF t.p. (viewed on July 4, 2010) |
Beschreibung: | 1 Online-Ressource (electronic texts (xiv, 229 p. ill.)) digital files |
DOI: | 10.4018/978-1-59140-583-2 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047945209 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 220419s2005 |||| o||u| ||||||eng d | ||
024 | 7 | |a 10.4018/978-1-59140-583-2 |2 doi | |
035 | |a (ZDB-1-IGE)068998368 | ||
035 | |a (OCoLC)1312709754 | ||
035 | |a (DE-599)BVBBV047945209 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-898 |a DE-706 |a DE-1050 |a DE-1049 |a DE-83 | ||
082 | 0 | |a 658.4/78 |2 22 | |
100 | 1 | |a Janczewski, Lech |d 1943- |e Verfasser |4 aut | |
245 | 1 | 0 | |a Managerial guide for handling cyber-terrorism and information warfare |c Lech J. Janczewski and Andrew M. Colarik |
264 | 1 | |a Hershey, Pa |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) |c c2005 | |
300 | |a 1 Online-Ressource (electronic texts (xiv, 229 p. ill.)) |b digital files | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Title from PDF t.p. (viewed on July 4, 2010) | ||
520 | |a This book defines the organizational security measures that will decrease an organization's information system vulnerabilities to all types of attacks | ||
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Information warfare | |
650 | 4 | |a Information technology |x Management | |
700 | 1 | |a Colarik, Andrew M. |4 ctb | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781591405832 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-59140-583-2 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-1-IGE |a ZDB-98-IGB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-033326639 | |
966 | e | |u https://doi.org/10.4018/978-1-59140-583-2 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59140-583-2 |l DE-706 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59140-583-2 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59140-583-2 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59140-583-2 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1808138582632693760 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Janczewski, Lech 1943- |
author2 | Colarik, Andrew M. |
author2_role | ctb |
author2_variant | a m c am amc |
author_facet | Janczewski, Lech 1943- Colarik, Andrew M. |
author_role | aut |
author_sort | Janczewski, Lech 1943- |
author_variant | l j lj |
building | Verbundindex |
bvnumber | BV047945209 |
collection | ZDB-1-IGE ZDB-98-IGB |
ctrlnum | (ZDB-1-IGE)068998368 (OCoLC)1312709754 (DE-599)BVBBV047945209 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
discipline_str_mv | Wirtschaftswissenschaften |
doi_str_mv | 10.4018/978-1-59140-583-2 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV047945209</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220419s2005 |||| o||u| ||||||eng d</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-59140-583-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-1-IGE)068998368</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1312709754</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047945209</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Janczewski, Lech</subfield><subfield code="d">1943-</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Managerial guide for handling cyber-terrorism and information warfare</subfield><subfield code="c">Lech J. Janczewski and Andrew M. Colarik</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pa</subfield><subfield code="b">IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)</subfield><subfield code="c">c2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (electronic texts (xiv, 229 p. ill.))</subfield><subfield code="b">digital files</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Title from PDF t.p. (viewed on July 4, 2010)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book defines the organizational security measures that will decrease an organization's information system vulnerabilities to all types of attacks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Management</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Colarik, Andrew M.</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781591405832</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-59140-583-2</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033326639</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59140-583-2</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59140-583-2</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59140-583-2</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59140-583-2</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59140-583-2</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047945209 |
illustrated | Not Illustrated |
index_date | 2024-07-03T19:36:12Z |
indexdate | 2024-08-23T01:08:46Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033326639 |
oclc_num | 1312709754 |
open_access_boolean | |
owner | DE-898 DE-BY-UBR DE-706 DE-1050 DE-1049 DE-83 |
owner_facet | DE-898 DE-BY-UBR DE-706 DE-1050 DE-1049 DE-83 |
physical | 1 Online-Ressource (electronic texts (xiv, 229 p. ill.)) digital files |
psigel | ZDB-1-IGE ZDB-98-IGB ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) |
record_format | marc |
spelling | Janczewski, Lech 1943- Verfasser aut Managerial guide for handling cyber-terrorism and information warfare Lech J. Janczewski and Andrew M. Colarik Hershey, Pa IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) c2005 1 Online-Ressource (electronic texts (xiv, 229 p. ill.)) digital files txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index. - Title from PDF t.p. (viewed on July 4, 2010) This book defines the organizational security measures that will decrease an organization's information system vulnerabilities to all types of attacks Cyberterrorism Computer crimes Information warfare Information technology Management Colarik, Andrew M. ctb Erscheint auch als Druck-Ausgabe 9781591405832 https://doi.org/10.4018/978-1-59140-583-2 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Janczewski, Lech 1943- Managerial guide for handling cyber-terrorism and information warfare Cyberterrorism Computer crimes Information warfare Information technology Management |
title | Managerial guide for handling cyber-terrorism and information warfare |
title_auth | Managerial guide for handling cyber-terrorism and information warfare |
title_exact_search | Managerial guide for handling cyber-terrorism and information warfare |
title_exact_search_txtP | Managerial guide for handling cyber-terrorism and information warfare |
title_full | Managerial guide for handling cyber-terrorism and information warfare Lech J. Janczewski and Andrew M. Colarik |
title_fullStr | Managerial guide for handling cyber-terrorism and information warfare Lech J. Janczewski and Andrew M. Colarik |
title_full_unstemmed | Managerial guide for handling cyber-terrorism and information warfare Lech J. Janczewski and Andrew M. Colarik |
title_short | Managerial guide for handling cyber-terrorism and information warfare |
title_sort | managerial guide for handling cyber terrorism and information warfare |
topic | Cyberterrorism Computer crimes Information warfare Information technology Management |
topic_facet | Cyberterrorism Computer crimes Information warfare Information technology Management |
url | https://doi.org/10.4018/978-1-59140-583-2 |
work_keys_str_mv | AT janczewskilech managerialguideforhandlingcyberterrorismandinformationwarfare AT colarikandrewm managerialguideforhandlingcyberterrorismandinformationwarfare |