000 | 02912cam a2200577Ii 4500 | ||
---|---|---|---|
001 | on1029054952 | ||
003 | OCoLC | ||
005 | 20220711203234.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 180320s2018 enk ob 001 0 eng d | ||
040 |
_aN$T _beng _erda _epn _cN$T _dN$T _dNLE _dDG1 _dRECBK _dOCLCA _dUPM _dOCLCF _dUAB _dOCLCQ _dUMR _dOCLCQ |
||
020 |
_a9781119516477 _q(electronic bk.) |
||
020 |
_a1119516471 _q(electronic bk.) |
||
020 |
_a9781119419785 _q(electronic bk.) |
||
020 |
_a1119419786 _q(electronic bk.) |
||
020 | _z9781848219724 | ||
029 | 1 |
_aCHNEW _b001003216 |
|
029 | 1 |
_aCHVBK _b516429310 |
|
035 | _a(OCoLC)1029054952 | ||
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aCOM _x060040 _2bisacsh |
|
072 | 7 |
_aCOM _x043050 _2bisacsh |
|
072 | 7 |
_aCOM _x053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
049 | _aMAIN | ||
100 | 1 |
_aArduin, Pierre-Emmanuel, _eauthor. _95672 |
|
245 | 1 | 0 |
_aInsider threats / _cPierre-Emmanuel Arduin. |
264 | 1 |
_aLondon : _bISTE Ltd. ; _aHoboken, NJ : _bJohn Wiley & Sons, Inc., _c2018. |
|
300 | _a1 online resource. | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 1 |
_aAdvances in information systems set ; _vvolume 10 |
|
588 | 0 | _aOnline resource; title from PDF title page (EBSCO, viewed March 26, 2018). | |
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _a1. Information Systems 1.1. The technological point of view -- managing computers 1.2. The Human point of view -- managing individuals 2. Security 2.1. The technological view of Information System's security 2.1. The Human view of Information System's security 3. Classifying attacks and managing countermeasures. | |
520 | _aAn information system may be regarded as an organized set of resources, both technological and human. Security should take this specificity into consideration in order to ensure an overall security of information systems. The security of information systems is usually tackled in a technological perspective. This book proposes to focus not only on information systems' security in a technological perspective, but also in a human, managerial and organizational perspective. | ||
650 | 0 |
_aComputer security. _93970 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 7 |
_aCOMPUTERS _xInternet _xSecurity. _2bisacsh _95673 |
|
650 | 7 |
_aCOMPUTERS _xNetworking _xSecurity. _2bisacsh _95674 |
|
650 | 7 |
_aCOMPUTERS _xSecurity _xGeneral. _2bisacsh _95675 |
|
650 | 7 |
_aComputer networks _xSecurity measures. _2fast _0(OCoLC)fst00872341 _93969 |
|
650 | 7 |
_aComputer security. _2fast _0(OCoLC)fst00872484 _93970 |
|
655 | 4 |
_aElectronic books. _93294 |
|
830 | 0 |
_aAdvances in information systems set ; _vv. 10. _95676 |
|
856 | 4 | 0 |
_uhttps://doi.org/10.1002/9781119419785 _zWiley Online Library |
942 | _cEBK | ||
994 |
_a92 _bDG1 |
||
999 |
_c68513 _d68513 |