The information systems security officer's guide establishing and managing an information protection program
Κύριος συγγραφέας: | |
---|---|
Μορφή: | Βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Elsevier Butterworth-Heinemann
|
Έκδοση: | 2nd ed. |
MARC
LEADER | 00000cam a22000001 4500 | ||
---|---|---|---|
001 | 1/10514 | ||
010 | |a 978-0-7506-7656-4 | ||
010 | |a 0-7506-7656-6 | ||
035 | |l 10013963 | ||
100 | |a 20090227d2003 y0grey010503 ba | ||
101 | 0 | |a eng | |
200 | 1 | |a The information systems security officer's guide |e establishing and managing an information protection program |f Gerald L. Kovacich | |
205 | |a 2nd ed. | ||
210 | |a Amsterdam |a Boston |c Elsevier Butterworth-Heinemann |d c2003 | ||
215 | |a xxviii, 361 p. |c fig. |d 24 cm. | ||
320 | |a Includes index | ||
606 | 0 | |a Ασφάλεια υπολογιστών | |
606 | 0 | |a Δεδομένα |x Προστασία | |
615 | |a ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) | ||
676 | |a 005.8 | ||
700 | 1 | |a Kovacich |b Gerald L. |4 070 | |
709 | |a Elsevier Butterworth-Heinemann | ||
801 | 0 | |a GR |b ΠΑ.Δ.Α. Βιβλιοθήκη Πανεπιστημιούπολης 2 |c 20090227 |g AACR2 | |
852 | |a INST |b LIBRARY |e 20090227 |h 005.8 KOV |p 000027286 |q 000027286 |t BK |y 23 |z 1 | ||
852 | |a INST |b LIBRARY |e 20090227 |h 005.8 KOV |p 000027291 |q 000027291 |t BK |y 0 |z 3 | ||
852 | |a INST |b LIBRARY |e 20090227 |h 005.8 KOV |p 000027301 |q 000027301 |t BK |y 0 |z 4 | ||
852 | |a INST |b LIBRARY |e 20090227 |h 005.8 KOV |p 000027420 |q 000027420 |t BK |y 0 |z 2 | ||
909 | |b 028294 | ||
909 | |b 028295 (c.2) | ||
909 | |b 031566 (c.3) | ||
909 | |b 031567 (c.4) | ||
960 | |a ΦΕΒΡΟΥΑΡΙΟΣ 2009 |
Εγγραφή στο Ευρετήριο Αναζήτησης
_version_ | 1780545233500504064 |
---|---|
author | Kovacich Gerald L. |
author_facet | Kovacich Gerald L. |
author_role | 070 |
author_sort | Kovacich Gerald L. |
author_variant | k g l kgl |
building | Campus Library II |
collection | LIB2 Catalog |
dewey-full | 005.8 |
dewey-hundreds | 000 |
dewey-ones | 005 |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 |
edition | 2nd ed. |
format | Book |
fullrecord | {"leader":"01407cam a22003491 4500","fields":[{"001":"1/10514"},{"010":{"subfields":[{"a":"978-0-7506-7656-4"}],"ind1":" ","ind2":" "}},{"010":{"subfields":[{"a":"0-7506-7656-6"}],"ind1":" ","ind2":" "}},{"035":{"subfields":[{"l":"10013963"}],"ind1":" ","ind2":" "}},{"100":{"subfields":[{"a":"20090227d2003 y0grey010503 ba"}],"ind1":" ","ind2":" "}},{"101":{"subfields":[{"a":"eng"}],"ind1":"0","ind2":" "}},{"200":{"subfields":[{"a":"The information systems security officer's guide"},{"e":"establishing and managing an information protection program"},{"f":"Gerald L. Kovacich"}],"ind1":"1","ind2":" "}},{"205":{"subfields":[{"a":"2nd ed."}],"ind1":" ","ind2":" "}},{"210":{"subfields":[{"a":"Amsterdam"},{"a":"Boston"},{"c":"Elsevier Butterworth-Heinemann"},{"d":"c2003"}],"ind1":" ","ind2":" "}},{"215":{"subfields":[{"a":"xxviii, 361 p."},{"c":"fig."},{"d":"24 cm."}],"ind1":" ","ind2":" "}},{"320":{"subfields":[{"a":"Includes index"}],"ind1":" ","ind2":" "}},{"606":{"subfields":[{"a":"\u0391\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1 \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ce\u03bd"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u0394\u03b5\u03b4\u03bf\u03bc\u03ad\u03bd\u03b1"},{"x":"\u03a0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c3\u03af\u03b1"}],"ind1":"0","ind2":" "}},{"615":{"subfields":[{"a":"\u0395\u03a0\u0399\u03a3\u03a4\u0397\u039c\u0397 \u03a5\u03a0\u039f\u039b\u039f\u0393\u0399\u03a3\u03a4\u0397 (SOFTWARE)"}],"ind1":" ","ind2":" "}},{"676":{"subfields":[{"a":"005.8"}],"ind1":" ","ind2":" "}},{"700":{"subfields":[{"a":"Kovacich"},{"b":"Gerald L."},{"4":"070"}],"ind1":" ","ind2":"1"}},{"709":{"subfields":[{"a":"Elsevier Butterworth-Heinemann"}],"ind1":" ","ind2":" "}},{"801":{"subfields":[{"a":"GR"},{"b":"\u03a0\u0391.\u0394.\u0391. \u0392\u03b9\u03b2\u03bb\u03b9\u03bf\u03b8\u03ae\u03ba\u03b7 \u03a0\u03b1\u03bd\u03b5\u03c0\u03b9\u03c3\u03c4\u03b7\u03bc\u03b9\u03bf\u03cd\u03c0\u03bf\u03bb\u03b7\u03c2 2"},{"c":"20090227"},{"g":"AACR2"}],"ind1":" ","ind2":"0"}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20090227"},{"h":"005.8 KOV"},{"p":"000027286"},{"q":"000027286"},{"t":"BK"},{"y":"23"},{"z":"1"}],"ind1":" ","ind2":" "}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20090227"},{"h":"005.8 KOV"},{"p":"000027291"},{"q":"000027291"},{"t":"BK"},{"y":"0"},{"z":"3"}],"ind1":" ","ind2":" "}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20090227"},{"h":"005.8 KOV"},{"p":"000027301"},{"q":"000027301"},{"t":"BK"},{"y":"0"},{"z":"4"}],"ind1":" ","ind2":" "}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20090227"},{"h":"005.8 KOV"},{"p":"000027420"},{"q":"000027420"},{"t":"BK"},{"y":"0"},{"z":"2"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"028294"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"028295 (c.2)"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"031566 (c.3)"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"031567 (c.4)"}],"ind1":" ","ind2":" "}},{"960":{"subfields":[{"a":"\u03a6\u0395\u0392\u03a1\u039f\u03a5\u0391\u03a1\u0399\u039f\u03a3 2009"}],"ind1":" ","ind2":" "}}]}
|
id | lib2_1/10514 |
illustrated | Illustrated |
institution | University of West Attica |
isbn | 978-0-7506-7656-4 0-7506-7656-6 |
language | English |
physical | xxviii, 361 p. fig. 24 cm. |
publishDate | 2003 |
publisher | Elsevier Butterworth-Heinemann |
record_format | marc |
spelling | 20090227d2003 y0grey010503 ba eng The information systems security officer's guide establishing and managing an information protection program Gerald L. Kovacich 2nd ed. Amsterdam Boston Elsevier Butterworth-Heinemann c2003 xxviii, 361 p. fig. 24 cm. Includes index Ασφάλεια υπολογιστών Δεδομένα Προστασία ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) 005.8 Kovacich Gerald L. 070 Elsevier Butterworth-Heinemann GR ΠΑ.Δ.Α. Βιβλιοθήκη Πανεπιστημιούπολης 2 20090227 AACR2 INST LIBRARY 20090227 005.8 KOV 000027286 000027286 BK 23 1 INST LIBRARY 20090227 005.8 KOV 000027291 000027291 BK 0 3 INST LIBRARY 20090227 005.8 KOV 000027301 000027301 BK 0 4 INST LIBRARY 20090227 005.8 KOV 000027420 000027420 BK 0 2 |
spellingShingle | Kovacich Gerald L. The information systems security officer's guide establishing and managing an information protection program Ασφάλεια υπολογιστών Δεδομένα Προστασία ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) |
title | The information systems security officer's guide establishing and managing an information protection program |
title_auth | The information systems security officer's guide establishing and managing an information protection program |
title_full | The information systems security officer's guide establishing and managing an information protection program Gerald L. Kovacich |
title_fullStr | The information systems security officer's guide establishing and managing an information protection program Gerald L. Kovacich |
title_full_unstemmed | The information systems security officer's guide establishing and managing an information protection program Gerald L. Kovacich |
title_short | The information systems security officer's guide |
title_sub | establishing and managing an information protection program |
topic | Ασφάλεια υπολογιστών Δεδομένα Προστασία ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) |
topic_facet | Ασφάλεια υπολογιστών Δεδομένα Προστασία |