Information security best practices :: 200 basic rules /
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Eagle Rock, Va. :
LLH Technology Pub.,
©2001.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | 1 online resource (ix, 112 pages) |
Bibliographie: | Includes bibliographical references (pages 107-109). |
ISBN: | 058544997X 9780585449975 9781878707963 1878707965 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm52383196 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 030606s2001 vau ob 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d YDXCP |d OCLCQ |d OCLCF |d OCLCO |d OCLCQ |d SLY |d CSL |d OCLCQ |d AGLDB |d OCLCA |d OCLCQ |d VTS |d INT |d OCLCQ |d STF |d M8D |d JX9 |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ | ||
019 | |a 82975998 |a 880326692 |a 961677058 |a 962642968 | ||
020 | |a 058544997X |q (electronic bk.) | ||
020 | |a 9780585449975 |q (electronic bk.) | ||
020 | |a 9781878707963 |q (electronic bk.) | ||
020 | |a 1878707965 |q (electronic bk.) | ||
035 | |a (OCoLC)52383196 |z (OCoLC)82975998 |z (OCoLC)880326692 |z (OCoLC)961677058 |z (OCoLC)962642968 | ||
050 | 4 | |a QA76.9.A25 |b S744 2001eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 21 | |
084 | |a TP309 |2 clc | ||
049 | |a MAIN | ||
100 | 1 | |a Stefanek, George L. | |
245 | 1 | 0 | |a Information security best practices : |b 200 basic rules / |c by George L. Stefanek. |
260 | |a Eagle Rock, Va. : |b LLH Technology Pub., |c ©2001. | ||
300 | |a 1 online resource (ix, 112 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references (pages 107-109). | ||
588 | 0 | |a Print version record. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 0 | 7 | |a Computer security. |2 cct |
650 | 0 | 7 | |a Computer networks |x Security measures. |2 cct |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
776 | 0 | 8 | |i Print version: |a Stefanek, George L. |t Information security best practices. |d Eagle Rock, Va. : LLH Technology Pub., ©2001 |z 1878707965 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=81836 |3 Volltext |
938 | |a EBSCOhost |b EBSC |n 81836 | ||
938 | |a YBP Library Services |b YANK |n 2333236 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm52383196 |
---|---|
_version_ | 1816881607592640512 |
adam_text | |
any_adam_object | |
author | Stefanek, George L. |
author_facet | Stefanek, George L. |
author_role | |
author_sort | Stefanek, George L. |
author_variant | g l s gl gls |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 S744 2001eb |
callnumber-search | QA76.9.A25 S744 2001eb |
callnumber-sort | QA 276.9 A25 S744 42001EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)52383196 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02489cam a2200577 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm52383196 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">030606s2001 vau ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SLY</subfield><subfield code="d">CSL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">INT</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">STF</subfield><subfield code="d">M8D</subfield><subfield code="d">JX9</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">82975998</subfield><subfield code="a">880326692</subfield><subfield code="a">961677058</subfield><subfield code="a">962642968</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">058544997X</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780585449975</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781878707963</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1878707965</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)52383196</subfield><subfield code="z">(OCoLC)82975998</subfield><subfield code="z">(OCoLC)880326692</subfield><subfield code="z">(OCoLC)961677058</subfield><subfield code="z">(OCoLC)962642968</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">S744 2001eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">TP309</subfield><subfield code="2">clc</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Stefanek, George L.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security best practices :</subfield><subfield code="b">200 basic rules /</subfield><subfield code="c">by George L. Stefanek.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Eagle Rock, Va. :</subfield><subfield code="b">LLH Technology Pub.,</subfield><subfield code="c">©2001.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (ix, 112 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 107-109).</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computer security.</subfield><subfield code="2">cct</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="2">cct</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Stefanek, George L.</subfield><subfield code="t">Information security best practices.</subfield><subfield code="d">Eagle Rock, Va. : LLH Technology Pub., ©2001</subfield><subfield code="z">1878707965</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=81836</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">81836</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2333236</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocm52383196 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:15:25Z |
institution | BVB |
isbn | 058544997X 9780585449975 9781878707963 1878707965 |
language | English |
oclc_num | 52383196 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (ix, 112 pages) |
psigel | ZDB-4-EBA |
publishDate | 2001 |
publishDateSearch | 2001 |
publishDateSort | 2001 |
publisher | LLH Technology Pub., |
record_format | marc |
spelling | Stefanek, George L. Information security best practices : 200 basic rules / by George L. Stefanek. Eagle Rock, Va. : LLH Technology Pub., ©2001. 1 online resource (ix, 112 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references (pages 107-109). Print version record. Computer security. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security. cct Computer networks Security measures. cct Computer networks Security measures fast Computer security fast Print version: Stefanek, George L. Information security best practices. Eagle Rock, Va. : LLH Technology Pub., ©2001 1878707965 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=81836 Volltext |
spellingShingle | Stefanek, George L. Information security best practices : 200 basic rules / Computer security. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security. cct Computer networks Security measures. cct Computer networks Security measures fast Computer security fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 https://id.nlm.nih.gov/mesh/D016494 |
title | Information security best practices : 200 basic rules / |
title_auth | Information security best practices : 200 basic rules / |
title_exact_search | Information security best practices : 200 basic rules / |
title_full | Information security best practices : 200 basic rules / by George L. Stefanek. |
title_fullStr | Information security best practices : 200 basic rules / by George L. Stefanek. |
title_full_unstemmed | Information security best practices : 200 basic rules / by George L. Stefanek. |
title_short | Information security best practices : |
title_sort | information security best practices 200 basic rules |
title_sub | 200 basic rules / |
topic | Computer security. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security. cct Computer networks Security measures. cct Computer networks Security measures fast Computer security fast |
topic_facet | Computer security. Computer networks Security measures. Computer Security Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Security measures Computer security |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=81836 |
work_keys_str_mv | AT stefanekgeorgel informationsecuritybestpractices200basicrules |