End user information security policy template /:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
[Place of publication not identified] :
BrainMass Inc.,
2012.
|
Schriftenreihe: | Need to Know template.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Title from PDF title page (viewed on Mar. 14, 2013). |
Beschreibung: | 1 online resource. |
ISBN: | 9781927639610 1927639611 |
Zugangseinschränkungen: | Access restricted to LAC onsite clients. |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn830005897 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 130314s2012 xx o 000 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d N$T |d OCLCF |d YDXCP |d OCLCQ |d AGLDB |d OCLCA |d OCLCQ |d VTS |d M8D |d NLC |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCL | ||
015 | |a 20200400444 |2 can | ||
016 | |a (AMICUS)000044001494 | ||
019 | |a 903697962 |a 1032965886 |a 1243087192 | ||
020 | |a 9781927639610 |q (electronic bk.) | ||
020 | |a 1927639611 |q (electronic bk.) | ||
035 | |a (OCoLC)830005897 |z (OCoLC)903697962 |z (OCoLC)1032965886 |z (OCoLC)1243087192 | ||
050 | 4 | |a QA76.9.A25 |b B43 2012eb | |
055 | 0 | 0 | |a QA76.9.A25 |b B43 2012 |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
084 | |a cci1icc |2 lacc | ||
084 | |a coll11 |2 lacc | ||
049 | |a MAIN | ||
100 | 1 | |a Beachy, Rob. | |
245 | 1 | 0 | |a End user information security policy template / |c by Rob Beachy. |
246 | 1 | 4 | |a End user information systems policy |
260 | |a [Place of publication not identified] : |b BrainMass Inc., |c 2012. | ||
300 | |a 1 online resource. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Need to Know template | |
500 | |a Title from PDF title page (viewed on Mar. 14, 2013). | ||
506 | 1 | |a Access restricted to LAC onsite clients. |f Online access with authorization. |2 star |5 CaOONL | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Data protection. |0 http://id.loc.gov/authorities/subjects/sh85035859 | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Protection de l'information (Informatique) | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Data protection |2 fast | |
758 | |i has work: |a End user information security policy template (Text) |1 https://id.oclc.org/worldcat/entity/E39PD3BCDF4YCphMc8DWhFpJj3 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
830 | 0 | |a Need to Know template. | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=529772 |3 Volltext |
938 | |a EBSCOhost |b EBSC |n 529772 | ||
938 | |a YBP Library Services |b YANK |n 10252170 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn830005897 |
---|---|
_version_ | 1816882225035083776 |
adam_text | |
any_adam_object | |
author | Beachy, Rob |
author_facet | Beachy, Rob |
author_role | |
author_sort | Beachy, Rob |
author_variant | r b rb |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 B43 2012eb |
callnumber-search | QA76.9.A25 B43 2012eb |
callnumber-sort | QA 276.9 A25 B43 42012EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)830005897 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02691cam a2200637 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn830005897</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">130314s2012 xx o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCF</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">M8D</subfield><subfield code="d">NLC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">20200400444</subfield><subfield code="2">can</subfield></datafield><datafield tag="016" ind1=" " ind2=" "><subfield code="a">(AMICUS)000044001494</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">903697962</subfield><subfield code="a">1032965886</subfield><subfield code="a">1243087192</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781927639610</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1927639611</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)830005897</subfield><subfield code="z">(OCoLC)903697962</subfield><subfield code="z">(OCoLC)1032965886</subfield><subfield code="z">(OCoLC)1243087192</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">B43 2012eb</subfield></datafield><datafield tag="055" ind1="0" ind2="0"><subfield code="a">QA76.9.A25</subfield><subfield code="b">B43 2012</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">cci1icc</subfield><subfield code="2">lacc</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">coll11</subfield><subfield code="2">lacc</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Beachy, Rob.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">End user information security policy template /</subfield><subfield code="c">by Rob Beachy.</subfield></datafield><datafield tag="246" ind1="1" ind2="4"><subfield code="a">End user information systems policy</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">[Place of publication not identified] :</subfield><subfield code="b">BrainMass Inc.,</subfield><subfield code="c">2012.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Need to Know template</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from PDF title page (viewed on Mar. 14, 2013).</subfield></datafield><datafield tag="506" ind1="1" ind2=" "><subfield code="a">Access restricted to LAC onsite clients.</subfield><subfield code="f">Online access with authorization.</subfield><subfield code="2">star</subfield><subfield code="5">CaOONL</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85035859</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">End user information security policy template (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PD3BCDF4YCphMc8DWhFpJj3</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Need to Know template.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=529772</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">529772</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">10252170</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn830005897 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:25:13Z |
institution | BVB |
isbn | 9781927639610 1927639611 |
language | English |
oclc_num | 830005897 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource. |
psigel | ZDB-4-EBA |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | BrainMass Inc., |
record_format | marc |
series | Need to Know template. |
series2 | Need to Know template |
spelling | Beachy, Rob. End user information security policy template / by Rob Beachy. End user information systems policy [Place of publication not identified] : BrainMass Inc., 2012. 1 online resource. text txt rdacontent computer c rdamedia online resource cr rdacarrier Need to Know template Title from PDF title page (viewed on Mar. 14, 2013). Access restricted to LAC onsite clients. Online access with authorization. star CaOONL Computer security. Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Sécurité informatique. Protection de l'information (Informatique) Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Data protection fast has work: End user information security policy template (Text) https://id.oclc.org/worldcat/entity/E39PD3BCDF4YCphMc8DWhFpJj3 https://id.oclc.org/worldcat/ontology/hasWork Need to Know template. FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=529772 Volltext |
spellingShingle | Beachy, Rob End user information security policy template / Need to Know template. Computer security. Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Sécurité informatique. Protection de l'information (Informatique) Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Data protection fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85035859 http://id.loc.gov/authorities/subjects/sh94001277 |
title | End user information security policy template / |
title_alt | End user information systems policy |
title_auth | End user information security policy template / |
title_exact_search | End user information security policy template / |
title_full | End user information security policy template / by Rob Beachy. |
title_fullStr | End user information security policy template / by Rob Beachy. |
title_full_unstemmed | End user information security policy template / by Rob Beachy. |
title_short | End user information security policy template / |
title_sort | end user information security policy template |
topic | Computer security. Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Sécurité informatique. Protection de l'information (Informatique) Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Data protection fast |
topic_facet | Computer security. Data protection. Computer networks Security measures. Sécurité informatique. Protection de l'information (Informatique) Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Security measures Computer security Data protection |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=529772 |
work_keys_str_mv | AT beachyrob enduserinformationsecuritypolicytemplate AT beachyrob enduserinformationsystemspolicy |