Internet and intranet security management: risks and solutions
In the last 12 years we have observed amazing growth of electronic communication. From typical local networks through countrywide systems and business-based distributed processing, we have witnessed widespread implementation of computer-controlled transmissions encompassing almost every aspect of ou...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pa
IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)
2000
|
Schlagworte: | |
Online-Zugang: | DE-898 DE-706 DE-1050 DE-1049 DE-83 Volltext |
Zusammenfassung: | In the last 12 years we have observed amazing growth of electronic communication. From typical local networks through countrywide systems and business-based distributed processing, we have witnessed widespread implementation of computer-controlled transmissions encompassing almost every aspect of our business and private lives. This book addresses issues of information security from the managerial, global point of view. The global approach allows us to concentrate on issues that could be influenced by activities happening on opposite sides of the globe |
Beschreibung: | Includes bibliographical references and index. - Title from PDF t.p. (viewed on June 26, 2010) |
Beschreibung: | 1 Online-Ressource (electronic texts (302 p.)) digital files |
DOI: | 10.4018/978-1-87828-971-1 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047945235 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 220419s2000 |||| o||u| ||||||eng d | ||
024 | 7 | |a 10.4018/978-1-87828-971-1 |2 doi | |
035 | |a (ZDB-1-IGE)068997779 | ||
035 | |a (OCoLC)1312695643 | ||
035 | |a (DE-599)BVBBV047945235 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-898 |a DE-706 |a DE-1050 |a DE-1049 |a DE-83 | ||
082 | 0 | |a 005.8 |2 21 | |
100 | 1 | |a Janczewski, Lech |d 1943- |e Verfasser |4 aut | |
245 | 1 | 0 | |a Internet and intranet security management |b risks and solutions |c Lech Janczewski |
264 | 1 | |a Hershey, Pa |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) |c 2000 | |
300 | |a 1 Online-Ressource (electronic texts (302 p.)) |b digital files | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Title from PDF t.p. (viewed on June 26, 2010) | ||
520 | |a In the last 12 years we have observed amazing growth of electronic communication. From typical local networks through countrywide systems and business-based distributed processing, we have witnessed widespread implementation of computer-controlled transmissions encompassing almost every aspect of our business and private lives. This book addresses issues of information security from the managerial, global point of view. The global approach allows us to concentrate on issues that could be influenced by activities happening on opposite sides of the globe | ||
650 | 4 | |a Internet |x Security measures | |
650 | 4 | |a Intranets (Computer networks) |x Security measures | |
650 | 4 | |a Computers |x Access control | |
650 | 4 | |a Cryptography | |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-87828-971-1 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-1-IGE |a ZDB-98-IGB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-033326665 | |
966 | e | |u https://doi.org/10.4018/978-1-87828-971-1 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-87828-971-1 |l DE-706 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-87828-971-1 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-87828-971-1 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-87828-971-1 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1808138582677782528 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Janczewski, Lech 1943- |
author_facet | Janczewski, Lech 1943- |
author_role | aut |
author_sort | Janczewski, Lech 1943- |
author_variant | l j lj |
building | Verbundindex |
bvnumber | BV047945235 |
collection | ZDB-1-IGE ZDB-98-IGB |
ctrlnum | (ZDB-1-IGE)068997779 (OCoLC)1312695643 (DE-599)BVBBV047945235 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.4018/978-1-87828-971-1 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV047945235</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220419s2000 |||| o||u| ||||||eng d</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-87828-971-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-1-IGE)068997779</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1312695643</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047945235</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Janczewski, Lech</subfield><subfield code="d">1943-</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Internet and intranet security management</subfield><subfield code="b">risks and solutions</subfield><subfield code="c">Lech Janczewski</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pa</subfield><subfield code="b">IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)</subfield><subfield code="c">2000</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (electronic texts (302 p.))</subfield><subfield code="b">digital files</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Title from PDF t.p. (viewed on June 26, 2010)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In the last 12 years we have observed amazing growth of electronic communication. From typical local networks through countrywide systems and business-based distributed processing, we have witnessed widespread implementation of computer-controlled transmissions encompassing almost every aspect of our business and private lives. This book addresses issues of information security from the managerial, global point of view. The global approach allows us to concentrate on issues that could be influenced by activities happening on opposite sides of the globe</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Intranets (Computer networks)</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-87828-971-1</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033326665</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-87828-971-1</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-87828-971-1</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-87828-971-1</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-87828-971-1</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-87828-971-1</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047945235 |
illustrated | Not Illustrated |
index_date | 2024-07-03T19:36:12Z |
indexdate | 2024-08-23T01:08:46Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033326665 |
oclc_num | 1312695643 |
open_access_boolean | |
owner | DE-898 DE-BY-UBR DE-706 DE-1050 DE-1049 DE-83 |
owner_facet | DE-898 DE-BY-UBR DE-706 DE-1050 DE-1049 DE-83 |
physical | 1 Online-Ressource (electronic texts (302 p.)) digital files |
psigel | ZDB-1-IGE ZDB-98-IGB ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2000 |
publishDateSearch | 2000 |
publishDateSort | 2000 |
publisher | IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) |
record_format | marc |
spelling | Janczewski, Lech 1943- Verfasser aut Internet and intranet security management risks and solutions Lech Janczewski Hershey, Pa IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) 2000 1 Online-Ressource (electronic texts (302 p.)) digital files txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index. - Title from PDF t.p. (viewed on June 26, 2010) In the last 12 years we have observed amazing growth of electronic communication. From typical local networks through countrywide systems and business-based distributed processing, we have witnessed widespread implementation of computer-controlled transmissions encompassing almost every aspect of our business and private lives. This book addresses issues of information security from the managerial, global point of view. The global approach allows us to concentrate on issues that could be influenced by activities happening on opposite sides of the globe Internet Security measures Intranets (Computer networks) Security measures Computers Access control Cryptography https://doi.org/10.4018/978-1-87828-971-1 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Janczewski, Lech 1943- Internet and intranet security management risks and solutions Internet Security measures Intranets (Computer networks) Security measures Computers Access control Cryptography |
title | Internet and intranet security management risks and solutions |
title_auth | Internet and intranet security management risks and solutions |
title_exact_search | Internet and intranet security management risks and solutions |
title_exact_search_txtP | Internet and intranet security management risks and solutions |
title_full | Internet and intranet security management risks and solutions Lech Janczewski |
title_fullStr | Internet and intranet security management risks and solutions Lech Janczewski |
title_full_unstemmed | Internet and intranet security management risks and solutions Lech Janczewski |
title_short | Internet and intranet security management |
title_sort | internet and intranet security management risks and solutions |
title_sub | risks and solutions |
topic | Internet Security measures Intranets (Computer networks) Security measures Computers Access control Cryptography |
topic_facet | Internet Security measures Intranets (Computer networks) Security measures Computers Access control Cryptography |
url | https://doi.org/10.4018/978-1-87828-971-1 |
work_keys_str_mv | AT janczewskilech internetandintranetsecuritymanagementrisksandsolutions |