The information systems security officer's guide establishing and managing an information protection program

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Kovacich Gerald L. (Συγγραφέας)
Μορφή: Βιβλίο
Γλώσσα:English
Έκδοση: Elsevier Butterworth-Heinemann
Έκδοση:2nd ed.

MARC

LEADER 00000cam a22000001 4500
001 1/10514
010 |a 978-0-7506-7656-4 
010 |a 0-7506-7656-6 
035 |l 10013963 
100 |a 20090227d2003 y0grey010503 ba 
101 0 |a eng 
200 1 |a The information systems security officer's guide  |e establishing and managing an information protection program  |f Gerald L. Kovacich 
205 |a 2nd ed. 
210 |a Amsterdam  |a Boston  |c Elsevier Butterworth-Heinemann  |d c2003 
215 |a xxviii, 361 p.  |c fig.  |d 24 cm. 
320 |a Includes index 
606 0 |a Ασφάλεια υπολογιστών 
606 0 |a Δεδομένα  |x Προστασία 
615 |a ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) 
676 |a 005.8 
700 1 |a Kovacich  |b Gerald L.  |4 070 
709 |a Elsevier Butterworth-Heinemann 
801 0 |a GR  |b ΠΑ.Δ.Α. Βιβλιοθήκη Πανεπιστημιούπολης 2  |c 20090227  |g AACR2 
852 |a INST  |b LIBRARY  |e 20090227  |h 005.8 KOV  |p 000027286  |q 000027286  |t BK  |y 23  |z 1 
852 |a INST  |b LIBRARY  |e 20090227  |h 005.8 KOV  |p 000027291  |q 000027291  |t BK  |y 0  |z 3 
852 |a INST  |b LIBRARY  |e 20090227  |h 005.8 KOV  |p 000027301  |q 000027301  |t BK  |y 0  |z 4 
852 |a INST  |b LIBRARY  |e 20090227  |h 005.8 KOV  |p 000027420  |q 000027420  |t BK  |y 0  |z 2 
909 |b 028294 
909 |b 028295 (c.2) 
909 |b 031566 (c.3) 
909 |b 031567 (c.4) 
960 |a ΦΕΒΡΟΥΑΡΙΟΣ 2009 

Εγγραφή στο Ευρετήριο Αναζήτησης

_version_ 1780545233500504064
author Kovacich Gerald L.
author_facet Kovacich Gerald L.
author_role 070
author_sort Kovacich Gerald L.
author_variant k g l kgl
building Campus Library II
collection LIB2 Catalog
dewey-full 005.8
dewey-hundreds 000
dewey-ones 005
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000
edition 2nd ed.
format Book
fullrecord {"leader":"01407cam a22003491 4500","fields":[{"001":"1/10514"},{"010":{"subfields":[{"a":"978-0-7506-7656-4"}],"ind1":" ","ind2":" "}},{"010":{"subfields":[{"a":"0-7506-7656-6"}],"ind1":" ","ind2":" "}},{"035":{"subfields":[{"l":"10013963"}],"ind1":" ","ind2":" "}},{"100":{"subfields":[{"a":"20090227d2003 y0grey010503 ba"}],"ind1":" ","ind2":" "}},{"101":{"subfields":[{"a":"eng"}],"ind1":"0","ind2":" "}},{"200":{"subfields":[{"a":"The information systems security officer's guide"},{"e":"establishing and managing an information protection program"},{"f":"Gerald L. Kovacich"}],"ind1":"1","ind2":" "}},{"205":{"subfields":[{"a":"2nd ed."}],"ind1":" ","ind2":" "}},{"210":{"subfields":[{"a":"Amsterdam"},{"a":"Boston"},{"c":"Elsevier Butterworth-Heinemann"},{"d":"c2003"}],"ind1":" ","ind2":" "}},{"215":{"subfields":[{"a":"xxviii, 361 p."},{"c":"fig."},{"d":"24 cm."}],"ind1":" ","ind2":" "}},{"320":{"subfields":[{"a":"Includes index"}],"ind1":" ","ind2":" "}},{"606":{"subfields":[{"a":"\u0391\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1 \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ce\u03bd"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u0394\u03b5\u03b4\u03bf\u03bc\u03ad\u03bd\u03b1"},{"x":"\u03a0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c3\u03af\u03b1"}],"ind1":"0","ind2":" "}},{"615":{"subfields":[{"a":"\u0395\u03a0\u0399\u03a3\u03a4\u0397\u039c\u0397 \u03a5\u03a0\u039f\u039b\u039f\u0393\u0399\u03a3\u03a4\u0397 (SOFTWARE)"}],"ind1":" ","ind2":" "}},{"676":{"subfields":[{"a":"005.8"}],"ind1":" ","ind2":" "}},{"700":{"subfields":[{"a":"Kovacich"},{"b":"Gerald L."},{"4":"070"}],"ind1":" ","ind2":"1"}},{"709":{"subfields":[{"a":"Elsevier Butterworth-Heinemann"}],"ind1":" ","ind2":" "}},{"801":{"subfields":[{"a":"GR"},{"b":"\u03a0\u0391.\u0394.\u0391. \u0392\u03b9\u03b2\u03bb\u03b9\u03bf\u03b8\u03ae\u03ba\u03b7 \u03a0\u03b1\u03bd\u03b5\u03c0\u03b9\u03c3\u03c4\u03b7\u03bc\u03b9\u03bf\u03cd\u03c0\u03bf\u03bb\u03b7\u03c2 2"},{"c":"20090227"},{"g":"AACR2"}],"ind1":" ","ind2":"0"}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20090227"},{"h":"005.8 KOV"},{"p":"000027286"},{"q":"000027286"},{"t":"BK"},{"y":"23"},{"z":"1"}],"ind1":" ","ind2":" "}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20090227"},{"h":"005.8 KOV"},{"p":"000027291"},{"q":"000027291"},{"t":"BK"},{"y":"0"},{"z":"3"}],"ind1":" ","ind2":" "}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20090227"},{"h":"005.8 KOV"},{"p":"000027301"},{"q":"000027301"},{"t":"BK"},{"y":"0"},{"z":"4"}],"ind1":" ","ind2":" "}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20090227"},{"h":"005.8 KOV"},{"p":"000027420"},{"q":"000027420"},{"t":"BK"},{"y":"0"},{"z":"2"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"028294"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"028295 (c.2)"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"031566 (c.3)"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"031567 (c.4)"}],"ind1":" ","ind2":" "}},{"960":{"subfields":[{"a":"\u03a6\u0395\u0392\u03a1\u039f\u03a5\u0391\u03a1\u0399\u039f\u03a3 2009"}],"ind1":" ","ind2":" "}}]}
id lib2_1/10514
illustrated Illustrated
institution University of West Attica
isbn 978-0-7506-7656-4
0-7506-7656-6
language English
physical xxviii, 361 p. fig. 24 cm.
publishDate 2003
publisher Elsevier Butterworth-Heinemann
record_format marc
spelling 20090227d2003 y0grey010503 ba
eng
The information systems security officer's guide establishing and managing an information protection program Gerald L. Kovacich
2nd ed.
Amsterdam Boston Elsevier Butterworth-Heinemann c2003
xxviii, 361 p. fig. 24 cm.
Includes index
Ασφάλεια υπολογιστών
Δεδομένα Προστασία
ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE)
005.8
Kovacich Gerald L. 070
Elsevier Butterworth-Heinemann
GR ΠΑ.Δ.Α. Βιβλιοθήκη Πανεπιστημιούπολης 2 20090227 AACR2
INST LIBRARY 20090227 005.8 KOV 000027286 000027286 BK 23 1
INST LIBRARY 20090227 005.8 KOV 000027291 000027291 BK 0 3
INST LIBRARY 20090227 005.8 KOV 000027301 000027301 BK 0 4
INST LIBRARY 20090227 005.8 KOV 000027420 000027420 BK 0 2
spellingShingle Kovacich Gerald L.
The information systems security officer's guide establishing and managing an information protection program
Ασφάλεια υπολογιστών
Δεδομένα Προστασία
ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE)
title The information systems security officer's guide establishing and managing an information protection program
title_auth The information systems security officer's guide establishing and managing an information protection program
title_full The information systems security officer's guide establishing and managing an information protection program Gerald L. Kovacich
title_fullStr The information systems security officer's guide establishing and managing an information protection program Gerald L. Kovacich
title_full_unstemmed The information systems security officer's guide establishing and managing an information protection program Gerald L. Kovacich
title_short The information systems security officer's guide
title_sub establishing and managing an information protection program
topic Ασφάλεια υπολογιστών
Δεδομένα Προστασία
ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE)
topic_facet Ασφάλεια υπολογιστών
Δεδομένα Προστασία