Digital business security development management technologies

"This book provides comprehensive coverage of issues associated with maintaining business protection in digital environments, containing base level knowledge for managers who are not specialists in the field as well as advanced undergraduate and postgraduate students undertaking research and fu...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Weitere Verfasser: Kerr, Don 1952- (HerausgeberIn), Gammack, John (HerausgeberIn), Bryant, Kay (HerausgeberIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Hershey ; New York Business Science Reference [2011]
Schriftenreihe:Premier reference source
Schlagworte:
Online-Zugang:DE-706
DE-1049
DE-898
DE-1050
DE-83
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zc 4500
001 BV044281648
003 DE-604
005 20180504
007 cr|uuu---uuuuu
008 170424s2011 xx a||| o|||| 00||| eng d
020 |a 9781605668079  |9 978-1-60566-807-9 
020 |a 1605668079  |9 1-60566-807-9 
024 7 |a 10.4018/978-1-60566-806-2  |2 doi 
035 |a (OCoLC)992514381 
035 |a (DE-599)BVBBV044281648 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-706  |a DE-1049  |a DE-898  |a DE-1050  |a DE-83 
084 |a ST 276  |0 (DE-625)143642:  |2 rvk 
245 1 0 |a Digital business security development  |b management technologies  |c Don Kerr, University of the Sunshine Coast, Australia; John G. Gammack, Griffith University, Australia; Kay Bryant, Griffith University, Australia 
264 1 |a Hershey ; New York  |b Business Science Reference  |c [2011] 
264 4 |c © 2011 
300 |a 1 Online-Ressource (xvi, 223 Seiten)  |b Illustrationen 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 0 |a Premier reference source 
500 |a Includes bibliographical references 
505 8 |a 1. Overview of digital business security issues / Don Kerr, John Gammack, Richard Boddington -- 2. Digital evidence / Richard Boddington -- 3. Recent developments in simplified sign-on / Kevin Curran, Jennifer Caldwell, Declan Walsh, Marcella Gallacher -- 4. The effectiveness of privacy policy statements / Roger Clarke -- 5. An evaluation of user password practice / John Campbell, Kay Bryant -- 6. Wireless handheld device and LAN security issues / Raj Gururajan, Abdul Hafeez-Baig -- 7. Web 2.0 technologies for business solutions / Shah Miah -- 8. Business continuity planning / Oscar Imaz-Mairal -- 9. Future trends in digital security / Daniel Viney 
520 |a "This book provides comprehensive coverage of issues associated with maintaining business protection in digital environments, containing base level knowledge for managers who are not specialists in the field as well as advanced undergraduate and postgraduate students undertaking research and further study" - Provided by publisher 
650 4 |a Unternehmen 
650 4 |a Electronic commerce / Security measures 
650 4 |a Business enterprises / Computer networks / Security measures 
650 4 |a Computer security 
650 0 7 |a Electronic Commerce  |0 (DE-588)4592128-3  |2 gnd  |9 rswk-swf 
650 0 7 |a Unternehmen  |0 (DE-588)4061963-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)4143413-4  |a Aufsatzsammlung  |2 gnd-content 
689 0 0 |a Unternehmen  |0 (DE-588)4061963-1  |D s 
689 0 1 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 |5 DE-604 
689 1 0 |a Electronic Commerce  |0 (DE-588)4592128-3  |D s 
689 1 1 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 1 |5 DE-604 
700 1 |a Kerr, Don  |d 1952-  |0 (DE-588)13887946X  |4 edt 
700 1 |a Gammack, John  |4 edt 
700 1 |a Bryant, Kay  |0 (DE-588)113068590X  |4 edt 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-1-60566-806-2 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 1-60566-806-0 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-1-61692-350-1 
856 4 0 |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-806-2  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-98-IGB 
912 |a ZDB-1-IGE 
943 1 |a oai:aleph.bib-bvb.de:BVB01-029686004 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-806-2  |l DE-706  |p ZDB-98-IGB  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.4018/978-1-60566-806-2  |l DE-1049  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.4018/978-1-60566-806-2  |l DE-898  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.4018/978-1-60566-806-2  |l DE-1050  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.4018/978-1-60566-806-2  |l DE-83  |p ZDB-98-IGB  |q TUB_EBS_IGB  |x Verlag  |3 Volltext 

Datensatz im Suchindex

_version_ 1819300081882365952
any_adam_object
author2 Kerr, Don 1952-
Gammack, John
Bryant, Kay
author2_role edt
edt
edt
author2_variant d k dk
j g jg
k b kb
author_GND (DE-588)13887946X
(DE-588)113068590X
author_facet Kerr, Don 1952-
Gammack, John
Bryant, Kay
building Verbundindex
bvnumber BV044281648
classification_rvk ST 276
collection ZDB-98-IGB
ZDB-1-IGE
contents 1. Overview of digital business security issues / Don Kerr, John Gammack, Richard Boddington -- 2. Digital evidence / Richard Boddington -- 3. Recent developments in simplified sign-on / Kevin Curran, Jennifer Caldwell, Declan Walsh, Marcella Gallacher -- 4. The effectiveness of privacy policy statements / Roger Clarke -- 5. An evaluation of user password practice / John Campbell, Kay Bryant -- 6. Wireless handheld device and LAN security issues / Raj Gururajan, Abdul Hafeez-Baig -- 7. Web 2.0 technologies for business solutions / Shah Miah -- 8. Business continuity planning / Oscar Imaz-Mairal -- 9. Future trends in digital security / Daniel Viney
ctrlnum (OCoLC)992514381
(DE-599)BVBBV044281648
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04005nam a2200673zc 4500</leader><controlfield tag="001">BV044281648</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180504 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170424s2011 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781605668079</subfield><subfield code="9">978-1-60566-807-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1605668079</subfield><subfield code="9">1-60566-807-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-60566-806-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)992514381</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044281648</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Digital business security development</subfield><subfield code="b">management technologies</subfield><subfield code="c">Don Kerr, University of the Sunshine Coast, Australia; John G. Gammack, Griffith University, Australia; Kay Bryant, Griffith University, Australia</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey ; New York</subfield><subfield code="b">Business Science Reference</subfield><subfield code="c">[2011]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvi, 223 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">1. Overview of digital business security issues / Don Kerr, John Gammack, Richard Boddington -- 2. Digital evidence / Richard Boddington -- 3. Recent developments in simplified sign-on / Kevin Curran, Jennifer Caldwell, Declan Walsh, Marcella Gallacher -- 4. The effectiveness of privacy policy statements / Roger Clarke -- 5. An evaluation of user password practice / John Campbell, Kay Bryant -- 6. Wireless handheld device and LAN security issues / Raj Gururajan, Abdul Hafeez-Baig -- 7. Web 2.0 technologies for business solutions / Shah Miah -- 8. Business continuity planning / Oscar Imaz-Mairal -- 9. Future trends in digital security / Daniel Viney</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book provides comprehensive coverage of issues associated with maintaining business protection in digital environments, containing base level knowledge for managers who are not specialists in the field as well as advanced undergraduate and postgraduate students undertaking research and further study" - Provided by publisher</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Unternehmen</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic commerce / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises / Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Electronic Commerce</subfield><subfield code="0">(DE-588)4592128-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Electronic Commerce</subfield><subfield code="0">(DE-588)4592128-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kerr, Don</subfield><subfield code="d">1952-</subfield><subfield code="0">(DE-588)13887946X</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gammack, John</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bryant, Kay</subfield><subfield code="0">(DE-588)113068590X</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-60566-806-2</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-60566-806-0</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-61692-350-1</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-806-2</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029686004</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-806-2</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-60566-806-2</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-60566-806-2</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-60566-806-2</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-60566-806-2</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)4143413-4 Aufsatzsammlung gnd-content
genre_facet Aufsatzsammlung
id DE-604.BV044281648
illustrated Illustrated
indexdate 2024-12-24T05:56:01Z
institution BVB
isbn 9781605668079
1605668079
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-029686004
oclc_num 992514381
open_access_boolean
owner DE-706
DE-1049
DE-898
DE-BY-UBR
DE-1050
DE-83
owner_facet DE-706
DE-1049
DE-898
DE-BY-UBR
DE-1050
DE-83
physical 1 Online-Ressource (xvi, 223 Seiten) Illustrationen
psigel ZDB-98-IGB
ZDB-1-IGE
ZDB-98-IGB TUB_EBS_IGB
publishDate 2011
publishDateSearch 2011
publishDateSort 2011
publisher Business Science Reference
record_format marc
series2 Premier reference source
spelling Digital business security development management technologies Don Kerr, University of the Sunshine Coast, Australia; John G. Gammack, Griffith University, Australia; Kay Bryant, Griffith University, Australia
Hershey ; New York Business Science Reference [2011]
© 2011
1 Online-Ressource (xvi, 223 Seiten) Illustrationen
txt rdacontent
c rdamedia
cr rdacarrier
Premier reference source
Includes bibliographical references
1. Overview of digital business security issues / Don Kerr, John Gammack, Richard Boddington -- 2. Digital evidence / Richard Boddington -- 3. Recent developments in simplified sign-on / Kevin Curran, Jennifer Caldwell, Declan Walsh, Marcella Gallacher -- 4. The effectiveness of privacy policy statements / Roger Clarke -- 5. An evaluation of user password practice / John Campbell, Kay Bryant -- 6. Wireless handheld device and LAN security issues / Raj Gururajan, Abdul Hafeez-Baig -- 7. Web 2.0 technologies for business solutions / Shah Miah -- 8. Business continuity planning / Oscar Imaz-Mairal -- 9. Future trends in digital security / Daniel Viney
"This book provides comprehensive coverage of issues associated with maintaining business protection in digital environments, containing base level knowledge for managers who are not specialists in the field as well as advanced undergraduate and postgraduate students undertaking research and further study" - Provided by publisher
Unternehmen
Electronic commerce / Security measures
Business enterprises / Computer networks / Security measures
Computer security
Electronic Commerce (DE-588)4592128-3 gnd rswk-swf
Unternehmen (DE-588)4061963-1 gnd rswk-swf
Computersicherheit (DE-588)4274324-2 gnd rswk-swf
(DE-588)4143413-4 Aufsatzsammlung gnd-content
Unternehmen (DE-588)4061963-1 s
Computersicherheit (DE-588)4274324-2 s
DE-604
Electronic Commerce (DE-588)4592128-3 s
Kerr, Don 1952- (DE-588)13887946X edt
Gammack, John edt
Bryant, Kay (DE-588)113068590X edt
Erscheint auch als Druck-Ausgabe 978-1-60566-806-2
Erscheint auch als Druck-Ausgabe 1-60566-806-0
Erscheint auch als Druck-Ausgabe 978-1-61692-350-1
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-806-2 Verlag URL des Erstveröffentlichers Volltext
spellingShingle Digital business security development management technologies
1. Overview of digital business security issues / Don Kerr, John Gammack, Richard Boddington -- 2. Digital evidence / Richard Boddington -- 3. Recent developments in simplified sign-on / Kevin Curran, Jennifer Caldwell, Declan Walsh, Marcella Gallacher -- 4. The effectiveness of privacy policy statements / Roger Clarke -- 5. An evaluation of user password practice / John Campbell, Kay Bryant -- 6. Wireless handheld device and LAN security issues / Raj Gururajan, Abdul Hafeez-Baig -- 7. Web 2.0 technologies for business solutions / Shah Miah -- 8. Business continuity planning / Oscar Imaz-Mairal -- 9. Future trends in digital security / Daniel Viney
Unternehmen
Electronic commerce / Security measures
Business enterprises / Computer networks / Security measures
Computer security
Electronic Commerce (DE-588)4592128-3 gnd
Unternehmen (DE-588)4061963-1 gnd
Computersicherheit (DE-588)4274324-2 gnd
subject_GND (DE-588)4592128-3
(DE-588)4061963-1
(DE-588)4274324-2
(DE-588)4143413-4
title Digital business security development management technologies
title_auth Digital business security development management technologies
title_exact_search Digital business security development management technologies
title_full Digital business security development management technologies Don Kerr, University of the Sunshine Coast, Australia; John G. Gammack, Griffith University, Australia; Kay Bryant, Griffith University, Australia
title_fullStr Digital business security development management technologies Don Kerr, University of the Sunshine Coast, Australia; John G. Gammack, Griffith University, Australia; Kay Bryant, Griffith University, Australia
title_full_unstemmed Digital business security development management technologies Don Kerr, University of the Sunshine Coast, Australia; John G. Gammack, Griffith University, Australia; Kay Bryant, Griffith University, Australia
title_short Digital business security development
title_sort digital business security development management technologies
title_sub management technologies
topic Unternehmen
Electronic commerce / Security measures
Business enterprises / Computer networks / Security measures
Computer security
Electronic Commerce (DE-588)4592128-3 gnd
Unternehmen (DE-588)4061963-1 gnd
Computersicherheit (DE-588)4274324-2 gnd
topic_facet Unternehmen
Electronic commerce / Security measures
Business enterprises / Computer networks / Security measures
Computer security
Electronic Commerce
Computersicherheit
Aufsatzsammlung
url http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-806-2
work_keys_str_mv AT kerrdon digitalbusinesssecuritydevelopmentmanagementtechnologies
AT gammackjohn digitalbusinesssecuritydevelopmentmanagementtechnologies
AT bryantkay digitalbusinesssecuritydevelopmentmanagementtechnologies