Security the Human Factor

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Kearney, Paul (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Ely IT Governance Pub. 2010
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zc 4500
001 BV045349074
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 181210s2010 xx o|||| 00||| eng d
020 |a 9781849280648  |9 978-1-84928-064-8 
020 |a 1849280649  |9 1-84928-064-9 
035 |a (ZDB-4-ITC)ocn700706573 
035 |a (OCoLC)700706573 
035 |a (DE-599)BVBBV045349074 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
082 0 |a 005.8019 
100 1 |a Kearney, Paul  |e Verfasser  |4 aut 
245 1 0 |a Security  |b the Human Factor 
264 1 |a Ely  |b IT Governance Pub.  |c 2010 
300 |a 1 online resource (60 pages) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
500 |a Print version record 
505 8 |a This pocket guide is based on the approach used by BT to protect its own data security - one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives 
650 7 |a COMPUTERS / Internet / Security  |2 bisacsh 
650 7 |a COMPUTERS / Networking / Security  |2 bisacsh 
650 7 |a COMPUTERS / Security / General  |2 bisacsh 
650 7 |a Business enterprises / Computer networks / Security measures  |2 fast 
650 7 |a Information technology / Management  |2 fast 
650 7 |a Information technology / Security measures  |2 fast 
650 4 |a Business enterprises  |x Computer networks  |x Security measures  |a Information technology  |x Security measures  |a Information technology  |x Management 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |a Kearney, Paul  |t Security : The Human Factor  |d Ely : IT Governance Publishing, 2010  |z 9781849280631 
912 |a ZDB-4-ITC 
943 1 |a oai:aleph.bib-bvb.de:BVB01-030735726 

Datensatz im Suchindex

_version_ 1819303918286405632
any_adam_object
author Kearney, Paul
author_facet Kearney, Paul
author_role aut
author_sort Kearney, Paul
author_variant p k pk
building Verbundindex
bvnumber BV045349074
collection ZDB-4-ITC
contents This pocket guide is based on the approach used by BT to protect its own data security - one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives
ctrlnum (ZDB-4-ITC)ocn700706573
(OCoLC)700706573
(DE-599)BVBBV045349074
dewey-full 005.8019
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8019
dewey-search 005.8019
dewey-sort 15.8019
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01799nam a2200409zc 4500</leader><controlfield tag="001">BV045349074</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2010 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849280648</subfield><subfield code="9">978-1-84928-064-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849280649</subfield><subfield code="9">1-84928-064-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn700706573</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)700706573</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045349074</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8019</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kearney, Paul</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security</subfield><subfield code="b">the Human Factor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely</subfield><subfield code="b">IT Governance Pub.</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (60 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">This pocket guide is based on the approach used by BT to protect its own data security - one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business enterprises / Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology / Management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield><subfield code="a">Information technology</subfield><subfield code="x">Management</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Kearney, Paul</subfield><subfield code="t">Security : The Human Factor</subfield><subfield code="d">Ely : IT Governance Publishing, 2010</subfield><subfield code="z">9781849280631</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030735726</subfield></datafield></record></collection>
id DE-604.BV045349074
illustrated Not Illustrated
indexdate 2024-12-24T06:56:58Z
institution BVB
isbn 9781849280648
1849280649
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-030735726
oclc_num 700706573
open_access_boolean
physical 1 online resource (60 pages)
psigel ZDB-4-ITC
publishDate 2010
publishDateSearch 2010
publishDateSort 2010
publisher IT Governance Pub.
record_format marc
spelling Kearney, Paul Verfasser aut
Security the Human Factor
Ely IT Governance Pub. 2010
1 online resource (60 pages)
txt rdacontent
c rdamedia
cr rdacarrier
Print version record
This pocket guide is based on the approach used by BT to protect its own data security - one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Business enterprises / Computer networks / Security measures fast
Information technology / Management fast
Information technology / Security measures fast
Business enterprises Computer networks Security measures Information technology Security measures Information technology Management
Erscheint auch als Druck-Ausgabe Kearney, Paul Security : The Human Factor Ely : IT Governance Publishing, 2010 9781849280631
spellingShingle Kearney, Paul
Security the Human Factor
This pocket guide is based on the approach used by BT to protect its own data security - one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Business enterprises / Computer networks / Security measures fast
Information technology / Management fast
Information technology / Security measures fast
Business enterprises Computer networks Security measures Information technology Security measures Information technology Management
title Security the Human Factor
title_auth Security the Human Factor
title_exact_search Security the Human Factor
title_full Security the Human Factor
title_fullStr Security the Human Factor
title_full_unstemmed Security the Human Factor
title_short Security
title_sort security the human factor
title_sub the Human Factor
topic COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Business enterprises / Computer networks / Security measures fast
Information technology / Management fast
Information technology / Security measures fast
Business enterprises Computer networks Security measures Information technology Security measures Information technology Management
topic_facet COMPUTERS / Internet / Security
COMPUTERS / Networking / Security
COMPUTERS / Security / General
Business enterprises / Computer networks / Security measures
Information technology / Management
Information technology / Security measures
Business enterprises Computer networks Security measures Information technology Security measures Information technology Management
work_keys_str_mv AT kearneypaul securitythehumanfactor