Information security management: global challenges in the new millennium
Information security is moving much higher up the agenda of corporate concerns. The pitfalls lying in wait of corporate information are legion. If information is our most important asset, then we must fortify ourselves for the task of protecting it properly. This book is a compilation of contributed...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pa
IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)
c2001
|
Schlagworte: | |
Online-Zugang: | DE-898 DE-706 DE-1050 DE-1049 DE-83 Volltext |
Zusammenfassung: | Information security is moving much higher up the agenda of corporate concerns. The pitfalls lying in wait of corporate information are legion. If information is our most important asset, then we must fortify ourselves for the task of protecting it properly. This book is a compilation of contributed chapters by researches and practitioners addressing issues, trends and challenges facing the management of information security in this new millennium. This title focuses on aspects of information security planning, evaluation, design and implementation |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (electronic texts (ii, 183 p. ill.)) digital files |
DOI: | 10.4018/978-1-87828-978-0 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047945261 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 220419s2001 |||| o||u| ||||||eng d | ||
024 | 7 | |a 10.4018/978-1-87828-978-0 |2 doi | |
035 | |a (ZDB-1-IGE)068997043 | ||
035 | |a (OCoLC)1312706712 | ||
035 | |a (DE-599)BVBBV047945261 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-898 |a DE-706 |a DE-1050 |a DE-1049 |a DE-83 | ||
082 | 0 | |a 005.8 |2 21 | |
245 | 1 | 0 | |a Information security management |b global challenges in the new millennium |c [edited by] Gurpreet Dhillon |
264 | 1 | |a Hershey, Pa |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) |c c2001 | |
300 | |a 1 Online-Ressource (electronic texts (ii, 183 p. ill.)) |b digital files | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a Information security is moving much higher up the agenda of corporate concerns. The pitfalls lying in wait of corporate information are legion. If information is our most important asset, then we must fortify ourselves for the task of protecting it properly. This book is a compilation of contributed chapters by researches and practitioners addressing issues, trends and challenges facing the management of information security in this new millennium. This title focuses on aspects of information security planning, evaluation, design and implementation | ||
650 | 4 | |a Computer security |x Management | |
700 | 1 | |a Dhillon, Gurpreet |d 1963- |4 ctb | |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-87828-978-0 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-1-IGE |a ZDB-98-IGB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-033326691 | |
966 | e | |u https://doi.org/10.4018/978-1-87828-978-0 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-87828-978-0 |l DE-706 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-87828-978-0 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-87828-978-0 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-87828-978-0 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1808138582716579840 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Dhillon, Gurpreet 1963- |
author2_role | ctb |
author2_variant | g d gd |
author_facet | Dhillon, Gurpreet 1963- |
building | Verbundindex |
bvnumber | BV047945261 |
collection | ZDB-1-IGE ZDB-98-IGB |
ctrlnum | (ZDB-1-IGE)068997043 (OCoLC)1312706712 (DE-599)BVBBV047945261 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.4018/978-1-87828-978-0 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV047945261</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220419s2001 |||| o||u| ||||||eng d</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-87828-978-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-1-IGE)068997043</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1312706712</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047945261</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security management</subfield><subfield code="b">global challenges in the new millennium</subfield><subfield code="c">[edited by] Gurpreet Dhillon</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pa</subfield><subfield code="b">IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)</subfield><subfield code="c">c2001</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (electronic texts (ii, 183 p. ill.))</subfield><subfield code="b">digital files</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Information security is moving much higher up the agenda of corporate concerns. The pitfalls lying in wait of corporate information are legion. If information is our most important asset, then we must fortify ourselves for the task of protecting it properly. This book is a compilation of contributed chapters by researches and practitioners addressing issues, trends and challenges facing the management of information security in this new millennium. This title focuses on aspects of information security planning, evaluation, design and implementation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dhillon, Gurpreet</subfield><subfield code="d">1963-</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-87828-978-0</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033326691</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-87828-978-0</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-87828-978-0</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-87828-978-0</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-87828-978-0</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-87828-978-0</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047945261 |
illustrated | Not Illustrated |
index_date | 2024-07-03T19:36:12Z |
indexdate | 2024-08-23T01:08:46Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033326691 |
oclc_num | 1312706712 |
open_access_boolean | |
owner | DE-898 DE-BY-UBR DE-706 DE-1050 DE-1049 DE-83 |
owner_facet | DE-898 DE-BY-UBR DE-706 DE-1050 DE-1049 DE-83 |
physical | 1 Online-Ressource (electronic texts (ii, 183 p. ill.)) digital files |
psigel | ZDB-1-IGE ZDB-98-IGB ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2001 |
publishDateSearch | 2001 |
publishDateSort | 2001 |
publisher | IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) |
record_format | marc |
spelling | Information security management global challenges in the new millennium [edited by] Gurpreet Dhillon Hershey, Pa IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) c2001 1 Online-Ressource (electronic texts (ii, 183 p. ill.)) digital files txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Information security is moving much higher up the agenda of corporate concerns. The pitfalls lying in wait of corporate information are legion. If information is our most important asset, then we must fortify ourselves for the task of protecting it properly. This book is a compilation of contributed chapters by researches and practitioners addressing issues, trends and challenges facing the management of information security in this new millennium. This title focuses on aspects of information security planning, evaluation, design and implementation Computer security Management Dhillon, Gurpreet 1963- ctb https://doi.org/10.4018/978-1-87828-978-0 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Information security management global challenges in the new millennium Computer security Management |
title | Information security management global challenges in the new millennium |
title_auth | Information security management global challenges in the new millennium |
title_exact_search | Information security management global challenges in the new millennium |
title_exact_search_txtP | Information security management global challenges in the new millennium |
title_full | Information security management global challenges in the new millennium [edited by] Gurpreet Dhillon |
title_fullStr | Information security management global challenges in the new millennium [edited by] Gurpreet Dhillon |
title_full_unstemmed | Information security management global challenges in the new millennium [edited by] Gurpreet Dhillon |
title_short | Information security management |
title_sort | information security management global challenges in the new millennium |
title_sub | global challenges in the new millennium |
topic | Computer security Management |
topic_facet | Computer security Management |
url | https://doi.org/10.4018/978-1-87828-978-0 |
work_keys_str_mv | AT dhillongurpreet informationsecuritymanagementglobalchallengesinthenewmillennium |