Bring your own device (BYOD) vs. corporate owned-personally enabled (COPE) strategy for enterprise mobility

Gespeichert in:
Bibliographische Detailangaben
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: [Place of publication not identified] Mind Commerce [2013]
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000zc 4500
001 BV045350731
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 181210s2013 |||| o||u| ||||||eng d
020 |a 9781461925095  |9 978-1-4619-2509-5 
020 |a 1461925096  |9 1-4619-2509-6 
035 |a (ZDB-4-ITC)ocn880903120 
035 |a (OCoLC)880903120 
035 |a (DE-599)BVBBV045350731 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
082 0 |a 004  |2 23 
245 1 0 |a Bring your own device (BYOD) vs. corporate owned-personally enabled (COPE) strategy for enterprise mobility 
264 1 |a [Place of publication not identified]  |b Mind Commerce  |c [2013] 
264 4 |c 2013 
300 |a 1 online resource 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
500 |a Title from PDF title page (viewed on June 3, 2014). - "January 2013." 
650 7 |a COMPUTERS / Computer Literacy  |2 bisacsh 
650 7 |a COMPUTERS / Computer Science  |2 bisacsh 
650 7 |a COMPUTERS / Data Processing  |2 bisacsh 
650 7 |a COMPUTERS / Hardware / General  |2 bisacsh 
650 7 |a COMPUTERS / Information Technology  |2 bisacsh 
650 7 |a COMPUTERS / Machine Theory  |2 bisacsh 
650 7 |a COMPUTERS / Reference  |2 bisacsh 
650 7 |a Computer networks / Access control  |2 fast 
650 7 |a Information technology / Management  |2 fast 
650 7 |a Information technology / Security measures  |2 fast 
650 7 |a Mobile computing  |2 fast 
650 4 |a Information technology  |x Management  |a Information technology  |x Security measures  |a Computer networks  |x Access control  |a Mobile computing 
912 |a ZDB-4-ITC 
999 |a oai:aleph.bib-bvb.de:BVB01-030737385 

Datensatz im Suchindex

_version_ 1804179175597146112
any_adam_object
building Verbundindex
bvnumber BV045350731
collection ZDB-4-ITC
ctrlnum (ZDB-4-ITC)ocn880903120
(OCoLC)880903120
(DE-599)BVBBV045350731
dewey-full 004
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 004 - Computer science
dewey-raw 004
dewey-search 004
dewey-sort 14
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01713nmm a2200445zc 4500</leader><controlfield tag="001">BV045350731</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781461925095</subfield><subfield code="9">978-1-4619-2509-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1461925096</subfield><subfield code="9">1-4619-2509-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn880903120</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)880903120</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045350731</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Bring your own device (BYOD) vs. corporate owned-personally enabled (COPE) strategy for enterprise mobility</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Mind Commerce</subfield><subfield code="c">[2013]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from PDF title page (viewed on June 3, 2014). - "January 2013."</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Literacy</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Data Processing</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Hardware / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Information Technology</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Machine Theory</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Reference</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology / Management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Mobile computing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Management</subfield><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield><subfield code="a">Mobile computing</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030737385</subfield></datafield></record></collection>
id DE-604.BV045350731
illustrated Not Illustrated
indexdate 2024-07-10T08:15:41Z
institution BVB
isbn 9781461925095
1461925096
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-030737385
oclc_num 880903120
open_access_boolean
physical 1 online resource
psigel ZDB-4-ITC
publishDate 2013
publishDateSearch 2013
publishDateSort 2013
publisher Mind Commerce
record_format marc
spelling Bring your own device (BYOD) vs. corporate owned-personally enabled (COPE) strategy for enterprise mobility
[Place of publication not identified] Mind Commerce [2013]
2013
1 online resource
txt rdacontent
c rdamedia
cr rdacarrier
Title from PDF title page (viewed on June 3, 2014). - "January 2013."
COMPUTERS / Computer Literacy bisacsh
COMPUTERS / Computer Science bisacsh
COMPUTERS / Data Processing bisacsh
COMPUTERS / Hardware / General bisacsh
COMPUTERS / Information Technology bisacsh
COMPUTERS / Machine Theory bisacsh
COMPUTERS / Reference bisacsh
Computer networks / Access control fast
Information technology / Management fast
Information technology / Security measures fast
Mobile computing fast
Information technology Management Information technology Security measures Computer networks Access control Mobile computing
spellingShingle Bring your own device (BYOD) vs. corporate owned-personally enabled (COPE) strategy for enterprise mobility
COMPUTERS / Computer Literacy bisacsh
COMPUTERS / Computer Science bisacsh
COMPUTERS / Data Processing bisacsh
COMPUTERS / Hardware / General bisacsh
COMPUTERS / Information Technology bisacsh
COMPUTERS / Machine Theory bisacsh
COMPUTERS / Reference bisacsh
Computer networks / Access control fast
Information technology / Management fast
Information technology / Security measures fast
Mobile computing fast
Information technology Management Information technology Security measures Computer networks Access control Mobile computing
title Bring your own device (BYOD) vs. corporate owned-personally enabled (COPE) strategy for enterprise mobility
title_auth Bring your own device (BYOD) vs. corporate owned-personally enabled (COPE) strategy for enterprise mobility
title_exact_search Bring your own device (BYOD) vs. corporate owned-personally enabled (COPE) strategy for enterprise mobility
title_full Bring your own device (BYOD) vs. corporate owned-personally enabled (COPE) strategy for enterprise mobility
title_fullStr Bring your own device (BYOD) vs. corporate owned-personally enabled (COPE) strategy for enterprise mobility
title_full_unstemmed Bring your own device (BYOD) vs. corporate owned-personally enabled (COPE) strategy for enterprise mobility
title_short Bring your own device (BYOD) vs. corporate owned-personally enabled (COPE) strategy for enterprise mobility
title_sort bring your own device byod vs corporate owned personally enabled cope strategy for enterprise mobility
topic COMPUTERS / Computer Literacy bisacsh
COMPUTERS / Computer Science bisacsh
COMPUTERS / Data Processing bisacsh
COMPUTERS / Hardware / General bisacsh
COMPUTERS / Information Technology bisacsh
COMPUTERS / Machine Theory bisacsh
COMPUTERS / Reference bisacsh
Computer networks / Access control fast
Information technology / Management fast
Information technology / Security measures fast
Mobile computing fast
Information technology Management Information technology Security measures Computer networks Access control Mobile computing
topic_facet COMPUTERS / Computer Literacy
COMPUTERS / Computer Science
COMPUTERS / Data Processing
COMPUTERS / Hardware / General
COMPUTERS / Information Technology
COMPUTERS / Machine Theory
COMPUTERS / Reference
Computer networks / Access control
Information technology / Management
Information technology / Security measures
Mobile computing
Information technology Management Information technology Security measures Computer networks Access control Mobile computing