Insider threats / (Record no. 68513)

000 -LEADER
fixed length control field 02912cam a2200577Ii 4500
001 - CONTROL NUMBER
control field on1029054952
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220711203234.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180320s2018 enk ob 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119516477
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119516471
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119419785
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119419786
-- (electronic bk.)
029 1# - (OCLC)
OCLC library identifier CHNEW
System control number 001003216
029 1# - (OCLC)
OCLC library identifier CHVBK
System control number 516429310
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
100 1# - AUTHOR NAME
Author Arduin, Pierre-Emmanuel,
245 10 - TITLE STATEMENT
Title Insider threats /
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 online resource.
490 1# - SERIES STATEMENT
Series statement Advances in information systems set ;
505 0# - FORMATTED CONTENTS NOTE
Remark 2 1. Information Systems 1.1. The technological point of view -- managing computers 1.2. The Human point of view -- managing individuals 2. Security 2.1. The technological view of Information System's security 2.1. The Human view of Information System's security 3. Classifying attacks and managing countermeasures.
520 ## - SUMMARY, ETC.
Summary, etc An information system may be regarded as an organized set of resources, both technological and human. Security should take this specificity into consideration in order to ensure an overall security of information systems. The security of information systems is usually tackled in a technological perspective. This book proposes to focus not only on information systems' security in a technological perspective, but also in a human, managerial and organizational perspective.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Internet
-- Security.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Networking
-- Security.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security
-- General.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1002/9781119419785
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- London :
-- ISTE Ltd. ;
-- Hoboken, NJ :
-- John Wiley & Sons, Inc.,
-- 2018.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
588 0# -
-- Online resource; title from PDF title page (EBSCO, viewed March 26, 2018).
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer networks
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- COMPUTERS
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- COMPUTERS
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- COMPUTERS
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer networks
-- (OCoLC)fst00872341
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
-- (OCoLC)fst00872484
994 ## -
-- 92
-- DG1

No items available.