E-mail Security :: a Pocket Guide.
This pocket guide will help businesses to address the most important issues. Its comprehensive approach covers both the technical and the managerial aspects of the subject, offering valuable insights for IT professionals, managers and executives, as well as for individual users of e-mail.
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely :
IT Governance Pub.,
2010.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | This pocket guide will help businesses to address the most important issues. Its comprehensive approach covers both the technical and the managerial aspects of the subject, offering valuable insights for IT professionals, managers and executives, as well as for individual users of e-mail. |
Beschreibung: | 1 online resource (100 pages) |
Bibliographie: | Includes bibliographical references. |
ISBN: | 9781849280976 1849280975 1849280967 9781849280969 |
Internformat
MARC
LEADER | 00000cam a2200000Mi 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn700706576 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr |n|---||||| | ||
008 | 110205s2010 enk ob 000 0 eng d | ||
040 | |a MERUC |b eng |e pn |c MERUC |d EBLCP |d OCLCQ |d N$T |d E7B |d OCLCQ |d DEBSZ |d OCLCQ |d B24X7 |d UMI |d COO |d JSTOR |d OCLCF |d OCLCQ |d YDXCP |d OCLCQ |d JBG |d AGLDB |d Z5A |d LIV |d MERUC |d OCLCQ |d IOG |d OCLCA |d VTS |d CEF |d AU@ |d OCLCQ |d WYU |d LVT |d STF |d M8D |d UKAHL |d OCLCQ |d VT2 |d VLY |d MM9 |d UX1 |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d DEGRU |d YWS | ||
019 | |a 794491665 |a 859144396 |a 904220337 |a 1058804692 |a 1066005522 |a 1156381719 |a 1175621358 |a 1192338150 |a 1240524542 | ||
020 | |a 9781849280976 |q (electronic bk.) | ||
020 | |a 1849280975 |q (electronic bk.) | ||
020 | |z 1849280967 | ||
020 | |z 9781849280969 | ||
020 | |a 1849280967 | ||
020 | |a 9781849280969 | ||
024 | 3 | |a 9781849280969 | |
035 | |a (OCoLC)700706576 |z (OCoLC)794491665 |z (OCoLC)859144396 |z (OCoLC)904220337 |z (OCoLC)1058804692 |z (OCoLC)1066005522 |z (OCoLC)1156381719 |z (OCoLC)1175621358 |z (OCoLC)1192338150 |z (OCoLC)1240524542 | ||
037 | |a CL0500000301 |b Safari Books Online | ||
037 | |a 22573/ctt4k5nm1 |b JSTOR | ||
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a COM |x 018000 |2 bisacsh | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
072 | 7 | |a COM084020 |2 bisacsh | |
072 | 7 | |a COM053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Furnell, Steven. | |
245 | 1 | 0 | |a E-mail Security : |b a Pocket Guide. |
260 | |a Ely : |b IT Governance Pub., |c 2010. | ||
300 | |a 1 online resource (100 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
520 | |a This pocket guide will help businesses to address the most important issues. Its comprehensive approach covers both the technical and the managerial aspects of the subject, offering valuable insights for IT professionals, managers and executives, as well as for individual users of e-mail. | ||
588 | 0 | |a Print version record. | |
504 | |a Includes bibliographical references. | ||
505 | 0 | |a Preface; About the AuthorS; Acknowledgements; Contents; Glossary of Abbreviations; Chapter 1: E-mail: Can we live without it?; Chapter 2: E-mail threats and attacks; Chapter 3: Securing the client; Chapter 4: Safety in transit; Chapter 5: Server side security; Chapter 6: E-mail archiving; Chapter 7: Ethereal e-mail; Chapter 8: Risking our reputation?; Appendix: additional notes; ITG Resources | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Electronic mail systems |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh2005003449 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Desktop Applications |x Email Clients. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Electronic mail systems |x Security measures |2 fast | |
653 | |a computer security. | ||
653 | |a email security threats. | ||
653 | |a email security. | ||
653 | |a email. | ||
653 | |a information security. | ||
700 | 1 | |a Dowland, Paul S. | |
758 | |i has work: |a E-mail security (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFDCKf4qjrDkPJDDWJXjmd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Furnell, Steven. |t E-mail Security : A Pocket Guide. |d Ely : IT Governance Publishing, ©2010 |z 9781849280969 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=391127 |3 Volltext |
938 | |a De Gruyter |b DEGR |n 9781849280976 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH26134983 | ||
938 | |a Books 24x7 |b B247 |n bks00056009 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL647940 | ||
938 | |a ebrary |b EBRY |n ebr10554865 | ||
938 | |a EBSCOhost |b EBSC |n 391127 | ||
938 | |a YBP Library Services |b YANK |n 3615245 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn700706576 |
---|---|
_version_ | 1816881750777790464 |
adam_text | |
any_adam_object | |
author | Furnell, Steven |
author2 | Dowland, Paul S. |
author2_role | |
author2_variant | p s d ps psd |
author_facet | Furnell, Steven Dowland, Paul S. |
author_role | |
author_sort | Furnell, Steven |
author_variant | s f sf |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Preface; About the AuthorS; Acknowledgements; Contents; Glossary of Abbreviations; Chapter 1: E-mail: Can we live without it?; Chapter 2: E-mail threats and attacks; Chapter 3: Securing the client; Chapter 4: Safety in transit; Chapter 5: Server side security; Chapter 6: E-mail archiving; Chapter 7: Ethereal e-mail; Chapter 8: Risking our reputation?; Appendix: additional notes; ITG Resources |
ctrlnum | (OCoLC)700706576 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04143cam a2200805Mi 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn700706576</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |n|---|||||</controlfield><controlfield tag="008">110205s2010 enk ob 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MERUC</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">MERUC</subfield><subfield code="d">EBLCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">B24X7</subfield><subfield code="d">UMI</subfield><subfield code="d">COO</subfield><subfield code="d">JSTOR</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">JBG</subfield><subfield code="d">AGLDB</subfield><subfield code="d">Z5A</subfield><subfield code="d">LIV</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IOG</subfield><subfield code="d">OCLCA</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">LVT</subfield><subfield code="d">STF</subfield><subfield code="d">M8D</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VT2</subfield><subfield code="d">VLY</subfield><subfield code="d">MM9</subfield><subfield code="d">UX1</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">DEGRU</subfield><subfield code="d">YWS</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">794491665</subfield><subfield code="a">859144396</subfield><subfield code="a">904220337</subfield><subfield code="a">1058804692</subfield><subfield code="a">1066005522</subfield><subfield code="a">1156381719</subfield><subfield code="a">1175621358</subfield><subfield code="a">1192338150</subfield><subfield code="a">1240524542</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849280976</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849280975</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1849280967</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781849280969</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849280967</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849280969</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781849280969</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)700706576</subfield><subfield code="z">(OCoLC)794491665</subfield><subfield code="z">(OCoLC)859144396</subfield><subfield code="z">(OCoLC)904220337</subfield><subfield code="z">(OCoLC)1058804692</subfield><subfield code="z">(OCoLC)1066005522</subfield><subfield code="z">(OCoLC)1156381719</subfield><subfield code="z">(OCoLC)1175621358</subfield><subfield code="z">(OCoLC)1192338150</subfield><subfield code="z">(OCoLC)1240524542</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000301</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">22573/ctt4k5nm1</subfield><subfield code="b">JSTOR</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">018000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM084020</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Furnell, Steven.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">E-mail Security :</subfield><subfield code="b">a Pocket Guide.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Ely :</subfield><subfield code="b">IT Governance Pub.,</subfield><subfield code="c">2010.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (100 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This pocket guide will help businesses to address the most important issues. Its comprehensive approach covers both the technical and the managerial aspects of the subject, offering valuable insights for IT professionals, managers and executives, as well as for individual users of e-mail.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Preface; About the AuthorS; Acknowledgements; Contents; Glossary of Abbreviations; Chapter 1: E-mail: Can we live without it?; Chapter 2: E-mail threats and attacks; Chapter 3: Securing the client; Chapter 4: Safety in transit; Chapter 5: Server side security; Chapter 6: E-mail archiving; Chapter 7: Ethereal e-mail; Chapter 8: Risking our reputation?; Appendix: additional notes; ITG Resources</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic mail systems</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2005003449</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Desktop Applications</subfield><subfield code="x">Email Clients.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic mail systems</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">computer security.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">email security threats.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">email security.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">email.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">information security.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dowland, Paul S.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">E-mail security (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFDCKf4qjrDkPJDDWJXjmd</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Furnell, Steven.</subfield><subfield code="t">E-mail Security : A Pocket Guide.</subfield><subfield code="d">Ely : IT Governance Publishing, ©2010</subfield><subfield code="z">9781849280969</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=391127</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">De Gruyter</subfield><subfield code="b">DEGR</subfield><subfield code="n">9781849280976</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH26134983</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00056009</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL647940</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10554865</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">391127</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">3615245</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn700706576 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:17:41Z |
institution | BVB |
isbn | 9781849280976 1849280975 1849280967 9781849280969 |
language | English |
oclc_num | 700706576 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (100 pages) |
psigel | ZDB-4-EBA |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | IT Governance Pub., |
record_format | marc |
spelling | Furnell, Steven. E-mail Security : a Pocket Guide. Ely : IT Governance Pub., 2010. 1 online resource (100 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier This pocket guide will help businesses to address the most important issues. Its comprehensive approach covers both the technical and the managerial aspects of the subject, offering valuable insights for IT professionals, managers and executives, as well as for individual users of e-mail. Print version record. Includes bibliographical references. Preface; About the AuthorS; Acknowledgements; Contents; Glossary of Abbreviations; Chapter 1: E-mail: Can we live without it?; Chapter 2: E-mail threats and attacks; Chapter 3: Securing the client; Chapter 4: Safety in transit; Chapter 5: Server side security; Chapter 6: E-mail archiving; Chapter 7: Ethereal e-mail; Chapter 8: Risking our reputation?; Appendix: additional notes; ITG Resources Computer security. Electronic mail systems Security measures. http://id.loc.gov/authorities/subjects/sh2005003449 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh COMPUTERS Desktop Applications Email Clients. bisacsh Computer security fast Electronic mail systems Security measures fast computer security. email security threats. email security. email. information security. Dowland, Paul S. has work: E-mail security (Text) https://id.oclc.org/worldcat/entity/E39PCFDCKf4qjrDkPJDDWJXjmd https://id.oclc.org/worldcat/ontology/hasWork Print version: Furnell, Steven. E-mail Security : A Pocket Guide. Ely : IT Governance Publishing, ©2010 9781849280969 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=391127 Volltext |
spellingShingle | Furnell, Steven E-mail Security : a Pocket Guide. Preface; About the AuthorS; Acknowledgements; Contents; Glossary of Abbreviations; Chapter 1: E-mail: Can we live without it?; Chapter 2: E-mail threats and attacks; Chapter 3: Securing the client; Chapter 4: Safety in transit; Chapter 5: Server side security; Chapter 6: E-mail archiving; Chapter 7: Ethereal e-mail; Chapter 8: Risking our reputation?; Appendix: additional notes; ITG Resources Computer security. Electronic mail systems Security measures. http://id.loc.gov/authorities/subjects/sh2005003449 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh COMPUTERS Desktop Applications Email Clients. bisacsh Computer security fast Electronic mail systems Security measures fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2005003449 https://id.nlm.nih.gov/mesh/D016494 |
title | E-mail Security : a Pocket Guide. |
title_auth | E-mail Security : a Pocket Guide. |
title_exact_search | E-mail Security : a Pocket Guide. |
title_full | E-mail Security : a Pocket Guide. |
title_fullStr | E-mail Security : a Pocket Guide. |
title_full_unstemmed | E-mail Security : a Pocket Guide. |
title_short | E-mail Security : |
title_sort | e mail security a pocket guide |
title_sub | a Pocket Guide. |
topic | Computer security. Electronic mail systems Security measures. http://id.loc.gov/authorities/subjects/sh2005003449 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh COMPUTERS Desktop Applications Email Clients. bisacsh Computer security fast Electronic mail systems Security measures fast |
topic_facet | Computer security. Electronic mail systems Security measures. Computer Security Sécurité informatique. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. COMPUTERS Desktop Applications Email Clients. Computer security Electronic mail systems Security measures |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=391127 |
work_keys_str_mv | AT furnellsteven emailsecurityapocketguide AT dowlandpauls emailsecurityapocketguide |