IT ethics handbook :: right and wrong for IT professionals /
Aimed at any IT professional responsible for designing, configuring, deploying or managing information systems, this book takes on the difficult ethical issues that IT professional confront every day. It provides specific guidelines on how to apply ethical standards to day-to-day operations.
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA. :
Syngress Pub.,
2004.
©2004 |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Aimed at any IT professional responsible for designing, configuring, deploying or managing information systems, this book takes on the difficult ethical issues that IT professional confront every day. It provides specific guidelines on how to apply ethical standards to day-to-day operations. |
Beschreibung: | 1 online resource (xxxvi, 604 pages) |
ISBN: | 9780080478821 0080478824 1281055905 9781281055903 9786611055905 6611055908 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn148003188 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 070629s2004 mau o 000 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d YDXCP |d OCLCQ |d IDEBK |d OCLCQ |d MERUC |d OCLCQ |d OCLCF |d NLGGC |d E7B |d OCLCQ |d EBLCP |d NRU |d DEBSZ |d UMI |d OCLCQ |d COO |d KSU |d DEBBG |d AGLDB |d OCLCQ |d OCLCA |d VTS |d CEF |d EZ9 |d OCLCQ |d M8D |d OCLCQ |d VLY |d AJS |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 156831401 |a 476057373 |a 648302198 |a 945736472 |a 1162233383 |a 1241805389 |a 1300634105 | ||
020 | |a 9780080478821 |q (electronic bk.) | ||
020 | |a 0080478824 |q (electronic bk.) | ||
020 | |a 1281055905 | ||
020 | |a 9781281055903 | ||
020 | |a 9786611055905 | ||
020 | |a 6611055908 | ||
020 | |z 1931836140 | ||
020 | |z 9781931836142 | ||
035 | |a (OCoLC)148003188 |z (OCoLC)156831401 |z (OCoLC)476057373 |z (OCoLC)648302198 |z (OCoLC)945736472 |z (OCoLC)1162233383 |z (OCoLC)1241805389 |z (OCoLC)1300634105 | ||
037 | |a CL0500000729 |b Safari Books Online | ||
050 | 4 | |a QA76.9.A25 |b I59 2004eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Northcutt, Stephen. | |
245 | 1 | 0 | |a IT ethics handbook : |b right and wrong for IT professionals / |c Stephen Northcutt. |
260 | |a Rockland, MA. : |b Syngress Pub., |c 2004. | ||
264 | 4 | |c ©2004 | |
300 | |a 1 online resource (xxxvi, 604 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | 0 | |a Print version record. | |
520 | |a Aimed at any IT professional responsible for designing, configuring, deploying or managing information systems, this book takes on the difficult ethical issues that IT professional confront every day. It provides specific guidelines on how to apply ethical standards to day-to-day operations. | ||
505 | 0 | |a Cover; Contents; Introduction; System Administration and Operations; Audit; Vulnerability Disclosure; Digital Postmaster; E-mail Scams; Information Security Officers; Programmers and Systems Analysts; Database Administration; Information Service Providers (ISP); Brother's Keeper; End-user and Employee Computer Security; Customer Ethics; Trusted Assistant; Ethics and Contractors/ Consultants; Telecommuting and Mobile Computer Security; Personal Computer Users; Penetration Testing; Content Providing; Privacy; Management/ Employer Ethics; Conclusion; Related Titles. | |
546 | |a English. | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Computers |x Access control. |0 http://id.loc.gov/authorities/subjects/sh85029553 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Ordinateurs |x Accès |x Contrôle. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Computers |x Access control |2 fast | |
700 | 1 | |a Northcutt, Stephen. |0 http://id.loc.gov/authorities/names/nb99053323 | |
758 | |i has work: |a IT ethics handbook (Text) |1 https://id.oclc.org/worldcat/entity/E39PCG3dkvpyyBv9Rct4gJ69pd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Northcutt, Stephen. |t IT ethics handbook. |d Rockland, MA. : Syngress Pub., 2004 |z 1931836140 |z 9781931836142 |w (OCoLC)55950826 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=196380 |3 Volltext |
938 | |a EBL - Ebook Library |b EBLB |n EBL294226 | ||
938 | |a ebrary |b EBRY |n ebr10186186 | ||
938 | |a EBSCOhost |b EBSC |n 196380 | ||
938 | |a YBP Library Services |b YANK |n 2574535 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn148003188 |
---|---|
_version_ | 1816881649299750912 |
adam_text | |
any_adam_object | |
author | Northcutt, Stephen |
author2 | Northcutt, Stephen |
author2_role | |
author2_variant | s n sn |
author_GND | http://id.loc.gov/authorities/names/nb99053323 |
author_facet | Northcutt, Stephen Northcutt, Stephen |
author_role | |
author_sort | Northcutt, Stephen |
author_variant | s n sn |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 I59 2004eb |
callnumber-search | QA76.9.A25 I59 2004eb |
callnumber-sort | QA 276.9 A25 I59 42004EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Cover; Contents; Introduction; System Administration and Operations; Audit; Vulnerability Disclosure; Digital Postmaster; E-mail Scams; Information Security Officers; Programmers and Systems Analysts; Database Administration; Information Service Providers (ISP); Brother's Keeper; End-user and Employee Computer Security; Customer Ethics; Trusted Assistant; Ethics and Contractors/ Consultants; Telecommuting and Mobile Computer Security; Personal Computer Users; Penetration Testing; Content Providing; Privacy; Management/ Employer Ethics; Conclusion; Related Titles. |
ctrlnum | (OCoLC)148003188 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03850cam a2200685 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn148003188</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">070629s2004 mau o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">NLGGC</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">EBLCP</subfield><subfield code="d">NRU</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">UMI</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">KSU</subfield><subfield code="d">DEBBG</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">EZ9</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VLY</subfield><subfield code="d">AJS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">156831401</subfield><subfield code="a">476057373</subfield><subfield code="a">648302198</subfield><subfield code="a">945736472</subfield><subfield code="a">1162233383</subfield><subfield code="a">1241805389</subfield><subfield code="a">1300634105</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080478821</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080478824</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281055905</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281055903</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611055905</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611055908</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1931836140</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781931836142</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)148003188</subfield><subfield code="z">(OCoLC)156831401</subfield><subfield code="z">(OCoLC)476057373</subfield><subfield code="z">(OCoLC)648302198</subfield><subfield code="z">(OCoLC)945736472</subfield><subfield code="z">(OCoLC)1162233383</subfield><subfield code="z">(OCoLC)1241805389</subfield><subfield code="z">(OCoLC)1300634105</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000729</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">I59 2004eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Northcutt, Stephen.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">IT ethics handbook :</subfield><subfield code="b">right and wrong for IT professionals /</subfield><subfield code="c">Stephen Northcutt.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, MA. :</subfield><subfield code="b">Syngress Pub.,</subfield><subfield code="c">2004.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxxvi, 604 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Aimed at any IT professional responsible for designing, configuring, deploying or managing information systems, this book takes on the difficult ethical issues that IT professional confront every day. It provides specific guidelines on how to apply ethical standards to day-to-day operations.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Contents; Introduction; System Administration and Operations; Audit; Vulnerability Disclosure; Digital Postmaster; E-mail Scams; Information Security Officers; Programmers and Systems Analysts; Database Administration; Information Service Providers (ISP); Brother's Keeper; End-user and Employee Computer Security; Customer Ethics; Trusted Assistant; Ethics and Contractors/ Consultants; Telecommuting and Mobile Computer Security; Personal Computer Users; Penetration Testing; Content Providing; Privacy; Management/ Employer Ethics; Conclusion; Related Titles.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computers</subfield><subfield code="x">Access control.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85029553</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Ordinateurs</subfield><subfield code="x">Accès</subfield><subfield code="x">Contrôle.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Northcutt, Stephen.</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb99053323</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">IT ethics handbook (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCG3dkvpyyBv9Rct4gJ69pd</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Northcutt, Stephen.</subfield><subfield code="t">IT ethics handbook.</subfield><subfield code="d">Rockland, MA. : Syngress Pub., 2004</subfield><subfield code="z">1931836140</subfield><subfield code="z">9781931836142</subfield><subfield code="w">(OCoLC)55950826</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=196380</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL294226</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10186186</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">196380</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2574535</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn148003188 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:16:04Z |
institution | BVB |
isbn | 9780080478821 0080478824 1281055905 9781281055903 9786611055905 6611055908 |
language | English |
oclc_num | 148003188 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxxvi, 604 pages) |
psigel | ZDB-4-EBA |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Syngress Pub., |
record_format | marc |
spelling | Northcutt, Stephen. IT ethics handbook : right and wrong for IT professionals / Stephen Northcutt. Rockland, MA. : Syngress Pub., 2004. ©2004 1 online resource (xxxvi, 604 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Print version record. Aimed at any IT professional responsible for designing, configuring, deploying or managing information systems, this book takes on the difficult ethical issues that IT professional confront every day. It provides specific guidelines on how to apply ethical standards to day-to-day operations. Cover; Contents; Introduction; System Administration and Operations; Audit; Vulnerability Disclosure; Digital Postmaster; E-mail Scams; Information Security Officers; Programmers and Systems Analysts; Database Administration; Information Service Providers (ISP); Brother's Keeper; End-user and Employee Computer Security; Customer Ethics; Trusted Assistant; Ethics and Contractors/ Consultants; Telecommuting and Mobile Computer Security; Personal Computer Users; Penetration Testing; Content Providing; Privacy; Management/ Employer Ethics; Conclusion; Related Titles. English. Computer security. Computers Access control. http://id.loc.gov/authorities/subjects/sh85029553 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Ordinateurs Accès Contrôle. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Computers Access control fast Northcutt, Stephen. http://id.loc.gov/authorities/names/nb99053323 has work: IT ethics handbook (Text) https://id.oclc.org/worldcat/entity/E39PCG3dkvpyyBv9Rct4gJ69pd https://id.oclc.org/worldcat/ontology/hasWork Print version: Northcutt, Stephen. IT ethics handbook. Rockland, MA. : Syngress Pub., 2004 1931836140 9781931836142 (OCoLC)55950826 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=196380 Volltext |
spellingShingle | Northcutt, Stephen IT ethics handbook : right and wrong for IT professionals / Cover; Contents; Introduction; System Administration and Operations; Audit; Vulnerability Disclosure; Digital Postmaster; E-mail Scams; Information Security Officers; Programmers and Systems Analysts; Database Administration; Information Service Providers (ISP); Brother's Keeper; End-user and Employee Computer Security; Customer Ethics; Trusted Assistant; Ethics and Contractors/ Consultants; Telecommuting and Mobile Computer Security; Personal Computer Users; Penetration Testing; Content Providing; Privacy; Management/ Employer Ethics; Conclusion; Related Titles. Computer security. Computers Access control. http://id.loc.gov/authorities/subjects/sh85029553 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Ordinateurs Accès Contrôle. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Computers Access control fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85029553 https://id.nlm.nih.gov/mesh/D016494 |
title | IT ethics handbook : right and wrong for IT professionals / |
title_auth | IT ethics handbook : right and wrong for IT professionals / |
title_exact_search | IT ethics handbook : right and wrong for IT professionals / |
title_full | IT ethics handbook : right and wrong for IT professionals / Stephen Northcutt. |
title_fullStr | IT ethics handbook : right and wrong for IT professionals / Stephen Northcutt. |
title_full_unstemmed | IT ethics handbook : right and wrong for IT professionals / Stephen Northcutt. |
title_short | IT ethics handbook : |
title_sort | it ethics handbook right and wrong for it professionals |
title_sub | right and wrong for IT professionals / |
topic | Computer security. Computers Access control. http://id.loc.gov/authorities/subjects/sh85029553 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Ordinateurs Accès Contrôle. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Computers Access control fast |
topic_facet | Computer security. Computers Access control. Computer Security Sécurité informatique. Ordinateurs Accès Contrôle. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer security Computers Access control |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=196380 |
work_keys_str_mv | AT northcuttstephen itethicshandbookrightandwrongforitprofessionals |