Insider threats / (Record no. 68513)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02912cam a2200577Ii 4500 |
001 - CONTROL NUMBER | |
control field | on1029054952 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220711203234.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 180320s2018 enk ob 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781119516477 |
-- | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1119516471 |
-- | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781119419785 |
-- | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1119419786 |
-- | (electronic bk.) |
029 1# - (OCLC) | |
OCLC library identifier | CHNEW |
System control number | 001003216 |
029 1# - (OCLC) | |
OCLC library identifier | CHVBK |
System control number | 516429310 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8 |
100 1# - AUTHOR NAME | |
Author | Arduin, Pierre-Emmanuel, |
245 10 - TITLE STATEMENT | |
Title | Insider threats / |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | 1 online resource. |
490 1# - SERIES STATEMENT | |
Series statement | Advances in information systems set ; |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | 1. Information Systems 1.1. The technological point of view -- managing computers 1.2. The Human point of view -- managing individuals 2. Security 2.1. The technological view of Information System's security 2.1. The Human view of Information System's security 3. Classifying attacks and managing countermeasures. |
520 ## - SUMMARY, ETC. | |
Summary, etc | An information system may be regarded as an organized set of resources, both technological and human. Security should take this specificity into consideration in order to ensure an overall security of information systems. The security of information systems is usually tackled in a technological perspective. This book proposes to focus not only on information systems' security in a technological perspective, but also in a human, managerial and organizational perspective. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security measures. |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Internet |
-- | Security. |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Networking |
-- | Security. |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security |
-- | General. |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security measures. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1002/9781119419785 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | London : |
-- | ISTE Ltd. ; |
-- | Hoboken, NJ : |
-- | John Wiley & Sons, Inc., |
-- | 2018. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
588 0# - | |
-- | Online resource; title from PDF title page (EBSCO, viewed March 26, 2018). |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer networks |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | COMPUTERS |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | COMPUTERS |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | COMPUTERS |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer networks |
-- | (OCoLC)fst00872341 |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer security. |
-- | (OCoLC)fst00872484 |
994 ## - | |
-- | 92 |
-- | DG1 |
No items available.