Digital business security development management technologies
"This book provides comprehensive coverage of issues associated with maintaining business protection in digital environments, containing base level knowledge for managers who are not specialists in the field as well as advanced undergraduate and postgraduate students undertaking research and fu...
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey ; New York
Business Science Reference
[2011]
|
Schriftenreihe: | Premier reference source
|
Schlagworte: | |
Online-Zugang: | DE-706 DE-1049 DE-898 DE-1050 DE-83 URL des Erstveröffentlichers |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV044281648 | ||
003 | DE-604 | ||
005 | 20180504 | ||
007 | cr|uuu---uuuuu | ||
008 | 170424s2011 xx a||| o|||| 00||| eng d | ||
020 | |a 9781605668079 |9 978-1-60566-807-9 | ||
020 | |a 1605668079 |9 1-60566-807-9 | ||
024 | 7 | |a 10.4018/978-1-60566-806-2 |2 doi | |
035 | |a (OCoLC)992514381 | ||
035 | |a (DE-599)BVBBV044281648 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-1049 |a DE-898 |a DE-1050 |a DE-83 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
245 | 1 | 0 | |a Digital business security development |b management technologies |c Don Kerr, University of the Sunshine Coast, Australia; John G. Gammack, Griffith University, Australia; Kay Bryant, Griffith University, Australia |
264 | 1 | |a Hershey ; New York |b Business Science Reference |c [2011] | |
264 | 4 | |c © 2011 | |
300 | |a 1 Online-Ressource (xvi, 223 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Premier reference source | |
500 | |a Includes bibliographical references | ||
505 | 8 | |a 1. Overview of digital business security issues / Don Kerr, John Gammack, Richard Boddington -- 2. Digital evidence / Richard Boddington -- 3. Recent developments in simplified sign-on / Kevin Curran, Jennifer Caldwell, Declan Walsh, Marcella Gallacher -- 4. The effectiveness of privacy policy statements / Roger Clarke -- 5. An evaluation of user password practice / John Campbell, Kay Bryant -- 6. Wireless handheld device and LAN security issues / Raj Gururajan, Abdul Hafeez-Baig -- 7. Web 2.0 technologies for business solutions / Shah Miah -- 8. Business continuity planning / Oscar Imaz-Mairal -- 9. Future trends in digital security / Daniel Viney | |
520 | |a "This book provides comprehensive coverage of issues associated with maintaining business protection in digital environments, containing base level knowledge for managers who are not specialists in the field as well as advanced undergraduate and postgraduate students undertaking research and further study" - Provided by publisher | ||
650 | 4 | |a Unternehmen | |
650 | 4 | |a Electronic commerce / Security measures | |
650 | 4 | |a Business enterprises / Computer networks / Security measures | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Electronic Commerce |0 (DE-588)4592128-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Unternehmen |0 (DE-588)4061963-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Unternehmen |0 (DE-588)4061963-1 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Electronic Commerce |0 (DE-588)4592128-3 |D s |
689 | 1 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Kerr, Don |d 1952- |0 (DE-588)13887946X |4 edt | |
700 | 1 | |a Gammack, John |4 edt | |
700 | 1 | |a Bryant, Kay |0 (DE-588)113068590X |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-60566-806-2 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-60566-806-0 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-61692-350-1 |
856 | 4 | 0 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-806-2 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB | ||
912 | |a ZDB-1-IGE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029686004 | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-806-2 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-60566-806-2 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-60566-806-2 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-60566-806-2 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-60566-806-2 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1819300081882365952 |
---|---|
any_adam_object | |
author2 | Kerr, Don 1952- Gammack, John Bryant, Kay |
author2_role | edt edt edt |
author2_variant | d k dk j g jg k b kb |
author_GND | (DE-588)13887946X (DE-588)113068590X |
author_facet | Kerr, Don 1952- Gammack, John Bryant, Kay |
building | Verbundindex |
bvnumber | BV044281648 |
classification_rvk | ST 276 |
collection | ZDB-98-IGB ZDB-1-IGE |
contents | 1. Overview of digital business security issues / Don Kerr, John Gammack, Richard Boddington -- 2. Digital evidence / Richard Boddington -- 3. Recent developments in simplified sign-on / Kevin Curran, Jennifer Caldwell, Declan Walsh, Marcella Gallacher -- 4. The effectiveness of privacy policy statements / Roger Clarke -- 5. An evaluation of user password practice / John Campbell, Kay Bryant -- 6. Wireless handheld device and LAN security issues / Raj Gururajan, Abdul Hafeez-Baig -- 7. Web 2.0 technologies for business solutions / Shah Miah -- 8. Business continuity planning / Oscar Imaz-Mairal -- 9. Future trends in digital security / Daniel Viney |
ctrlnum | (OCoLC)992514381 (DE-599)BVBBV044281648 |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04005nam a2200673zc 4500</leader><controlfield tag="001">BV044281648</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180504 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170424s2011 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781605668079</subfield><subfield code="9">978-1-60566-807-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1605668079</subfield><subfield code="9">1-60566-807-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-60566-806-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)992514381</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044281648</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Digital business security development</subfield><subfield code="b">management technologies</subfield><subfield code="c">Don Kerr, University of the Sunshine Coast, Australia; John G. Gammack, Griffith University, Australia; Kay Bryant, Griffith University, Australia</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey ; New York</subfield><subfield code="b">Business Science Reference</subfield><subfield code="c">[2011]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvi, 223 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">1. Overview of digital business security issues / Don Kerr, John Gammack, Richard Boddington -- 2. Digital evidence / Richard Boddington -- 3. Recent developments in simplified sign-on / Kevin Curran, Jennifer Caldwell, Declan Walsh, Marcella Gallacher -- 4. The effectiveness of privacy policy statements / Roger Clarke -- 5. An evaluation of user password practice / John Campbell, Kay Bryant -- 6. Wireless handheld device and LAN security issues / Raj Gururajan, Abdul Hafeez-Baig -- 7. Web 2.0 technologies for business solutions / Shah Miah -- 8. Business continuity planning / Oscar Imaz-Mairal -- 9. Future trends in digital security / Daniel Viney</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book provides comprehensive coverage of issues associated with maintaining business protection in digital environments, containing base level knowledge for managers who are not specialists in the field as well as advanced undergraduate and postgraduate students undertaking research and further study" - Provided by publisher</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Unternehmen</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic commerce / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises / Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Electronic Commerce</subfield><subfield code="0">(DE-588)4592128-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Electronic Commerce</subfield><subfield code="0">(DE-588)4592128-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kerr, Don</subfield><subfield code="d">1952-</subfield><subfield code="0">(DE-588)13887946X</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gammack, John</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bryant, Kay</subfield><subfield code="0">(DE-588)113068590X</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-60566-806-2</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-60566-806-0</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-61692-350-1</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-806-2</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029686004</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-806-2</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-60566-806-2</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-60566-806-2</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-60566-806-2</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-60566-806-2</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV044281648 |
illustrated | Illustrated |
indexdate | 2024-12-24T05:56:01Z |
institution | BVB |
isbn | 9781605668079 1605668079 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029686004 |
oclc_num | 992514381 |
open_access_boolean | |
owner | DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
owner_facet | DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
physical | 1 Online-Ressource (xvi, 223 Seiten) Illustrationen |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Business Science Reference |
record_format | marc |
series2 | Premier reference source |
spelling | Digital business security development management technologies Don Kerr, University of the Sunshine Coast, Australia; John G. Gammack, Griffith University, Australia; Kay Bryant, Griffith University, Australia Hershey ; New York Business Science Reference [2011] © 2011 1 Online-Ressource (xvi, 223 Seiten) Illustrationen txt rdacontent c rdamedia cr rdacarrier Premier reference source Includes bibliographical references 1. Overview of digital business security issues / Don Kerr, John Gammack, Richard Boddington -- 2. Digital evidence / Richard Boddington -- 3. Recent developments in simplified sign-on / Kevin Curran, Jennifer Caldwell, Declan Walsh, Marcella Gallacher -- 4. The effectiveness of privacy policy statements / Roger Clarke -- 5. An evaluation of user password practice / John Campbell, Kay Bryant -- 6. Wireless handheld device and LAN security issues / Raj Gururajan, Abdul Hafeez-Baig -- 7. Web 2.0 technologies for business solutions / Shah Miah -- 8. Business continuity planning / Oscar Imaz-Mairal -- 9. Future trends in digital security / Daniel Viney "This book provides comprehensive coverage of issues associated with maintaining business protection in digital environments, containing base level knowledge for managers who are not specialists in the field as well as advanced undergraduate and postgraduate students undertaking research and further study" - Provided by publisher Unternehmen Electronic commerce / Security measures Business enterprises / Computer networks / Security measures Computer security Electronic Commerce (DE-588)4592128-3 gnd rswk-swf Unternehmen (DE-588)4061963-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Unternehmen (DE-588)4061963-1 s Computersicherheit (DE-588)4274324-2 s DE-604 Electronic Commerce (DE-588)4592128-3 s Kerr, Don 1952- (DE-588)13887946X edt Gammack, John edt Bryant, Kay (DE-588)113068590X edt Erscheint auch als Druck-Ausgabe 978-1-60566-806-2 Erscheint auch als Druck-Ausgabe 1-60566-806-0 Erscheint auch als Druck-Ausgabe 978-1-61692-350-1 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-806-2 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Digital business security development management technologies 1. Overview of digital business security issues / Don Kerr, John Gammack, Richard Boddington -- 2. Digital evidence / Richard Boddington -- 3. Recent developments in simplified sign-on / Kevin Curran, Jennifer Caldwell, Declan Walsh, Marcella Gallacher -- 4. The effectiveness of privacy policy statements / Roger Clarke -- 5. An evaluation of user password practice / John Campbell, Kay Bryant -- 6. Wireless handheld device and LAN security issues / Raj Gururajan, Abdul Hafeez-Baig -- 7. Web 2.0 technologies for business solutions / Shah Miah -- 8. Business continuity planning / Oscar Imaz-Mairal -- 9. Future trends in digital security / Daniel Viney Unternehmen Electronic commerce / Security measures Business enterprises / Computer networks / Security measures Computer security Electronic Commerce (DE-588)4592128-3 gnd Unternehmen (DE-588)4061963-1 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4592128-3 (DE-588)4061963-1 (DE-588)4274324-2 (DE-588)4143413-4 |
title | Digital business security development management technologies |
title_auth | Digital business security development management technologies |
title_exact_search | Digital business security development management technologies |
title_full | Digital business security development management technologies Don Kerr, University of the Sunshine Coast, Australia; John G. Gammack, Griffith University, Australia; Kay Bryant, Griffith University, Australia |
title_fullStr | Digital business security development management technologies Don Kerr, University of the Sunshine Coast, Australia; John G. Gammack, Griffith University, Australia; Kay Bryant, Griffith University, Australia |
title_full_unstemmed | Digital business security development management technologies Don Kerr, University of the Sunshine Coast, Australia; John G. Gammack, Griffith University, Australia; Kay Bryant, Griffith University, Australia |
title_short | Digital business security development |
title_sort | digital business security development management technologies |
title_sub | management technologies |
topic | Unternehmen Electronic commerce / Security measures Business enterprises / Computer networks / Security measures Computer security Electronic Commerce (DE-588)4592128-3 gnd Unternehmen (DE-588)4061963-1 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Unternehmen Electronic commerce / Security measures Business enterprises / Computer networks / Security measures Computer security Electronic Commerce Computersicherheit Aufsatzsammlung |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-806-2 |
work_keys_str_mv | AT kerrdon digitalbusinesssecuritydevelopmentmanagementtechnologies AT gammackjohn digitalbusinesssecuritydevelopmentmanagementtechnologies AT bryantkay digitalbusinesssecuritydevelopmentmanagementtechnologies |