Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Enterprise security for the executivesetting the tone from the top /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Enterprise security for the executiveJennifer L. Bayuk ; foreword by Donald F. Donahue.
Reminder of title:
setting the tone from the top /
Author:
Bayuk, Jennifer L.
Published:
Santa Barbara, Calif. :Praeger,c2010.
Description:
xi, 165 p. :ill. ;25 cm.
Subject:
Data protectionManagement.
Online resource:
An electronic book in the ABC-CLIO eBooks Online database, accessible through the World Wide Web; click for information.
ISBN:
0313376611 (e-book)
Enterprise security for the executivesetting the tone from the top /
Bayuk, Jennifer L.
Enterprise security for the executive
setting the tone from the top /[electronic resource] :Jennifer L. Bayuk ; foreword by Donald F. Donahue. - Santa Barbara, Calif. :Praeger,c2010. - xi, 165 p. :ill. ;25 cm.
Includes bibliographical references and index.
Tone at the top -- Threats and vulnerabilities -- Triad and true -- Secure products and services -- Security through matrix management -- Navigating the regulatory landscape -- Investigation and remediation -- The right stuff.
ISBN: 0313376611 (e-book)
LCCN: 2009039314Subjects--Topical Terms:
267796
Data protection
--Management.
LC Class. No.: HD61.5 / .B39 2010
Dewey Class. No.: 658.4/7
Enterprise security for the executivesetting the tone from the top /
LDR
:01243nmm 2200253 a 4500
001
266850
003
DLC
005
19991001184422.0
008
101104s2010 caua sb 001 0 eng
010
$a
2009039314
020
$a
0313376611 (e-book)
020
$a
9780313376610 (e-book)
020
$a
0313376603 (alk. paper)
020
$a
9780313376603 (alk. paper)
035
$a
ABC0313376611
040
$a
DLC
$c
DLC
050
0 0
$a
HD61.5
$b
.B39 2010
082
0 0
$a
658.4/7
$2
22
100
1
$a
Bayuk, Jennifer L.
$3
471294
245
1 0
$a
Enterprise security for the executive
$h
[electronic resource] :
$b
setting the tone from the top /
$c
Jennifer L. Bayuk ; foreword by Donald F. Donahue.
260
$a
Santa Barbara, Calif. :
$b
Praeger,
$c
c2010.
300
$a
xi, 165 p. :
$b
ill. ;
$c
25 cm.
504
$a
Includes bibliographical references and index.
505
0
$a
Tone at the top -- Threats and vulnerabilities -- Triad and true -- Secure products and services -- Security through matrix management -- Navigating the regulatory landscape -- Investigation and remediation -- The right stuff.
650
0
$a
Data protection
$x
Management.
$3
267796
650
0
$a
Business enterprises
$x
Security measures.
$3
267591
650
0
$a
Business enterprises
$x
Computer networks
$x
Security measures.
$3
192261
650
0
$a
Computer security
$x
Management.
$3
230939
776
1
$c
Original
$z
0313376603
856
4 0
$3
Bibliographic record display
$u
http://ebooks.abc-clio.com/?isbn=9780313376610
$z
An electronic book in the ABC-CLIO eBooks Online database, accessible through the World Wide Web; click for information.
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000043468
電子館藏
1圖書
電子書
EB HD61.5 .B39 2010
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://ebooks.abc-clio.com/?isbn=9780313376610
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login