000 04033cam a2200745 i 4500
001 on1029054952
003 OCoLC
005 20240523125540.0
006 m o d
007 cr cnu|||unuuu
008 180320s2018 enk ob 001 0 eng d
040 _aN$T
_beng
_erda
_epn
_cN$T
_dN$T
_dNLE
_dDG1
_dRECBK
_dOCLCA
_dUPM
_dOCLCF
_dUAB
_dOCLCQ
_dUMR
_dOCLCQ
_dU3W
_dOCLCQ
_dESU
_dYDX
_dUKAHL
_dOCLCQ
_dBWN
_dOCLCQ
_dOCLCO
_dK6U
_dOCLCQ
_dOCLCO
_dOCLCL
019 _a1088884961
_a1165740134
_a1175676344
020 _a9781119516477
_q(electronic bk.)
020 _a1119516471
_q(electronic bk.)
020 _a9781119419785
_q(electronic bk.)
020 _a1119419786
_q(electronic bk.)
020 _a1848219725
020 _a9781848219724
020 _z9781848219724
029 1 _aAU@
_b000062880864
029 1 _aCHNEW
_b001003216
029 1 _aCHVBK
_b516429310
029 1 _aAU@
_b000072394074
035 _a(OCoLC)1029054952
_z(OCoLC)1088884961
_z(OCoLC)1165740134
_z(OCoLC)1175676344
037 _a5323674
_bProquest Ebook Central
050 4 _aQA76.9.A25
072 7 _aCOM
_x060040
_2bisacsh
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
082 0 4 _a005.8
_223
049 _aMAIN
100 1 _aArduin, Pierre-Emmanuel,
_eauthor.
245 1 0 _aInsider threats /
_cPierre-Emmanuel Arduin.
264 1 _aLondon :
_bISTE Ltd. ;
_aHoboken, NJ :
_bJohn Wiley & Sons, Inc.,
_c2018.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aAdvances in information systems set ;
_vvolume 10
588 0 _aOnline resource; title from PDF title page (EBSCO, viewed March 26, 2018).
504 _aIncludes bibliographical references and index.
505 0 _a1. Information Systems 1.1. The technological point of view -- managing computers 1.2. The Human point of view -- managing individuals 2. Security 2.1. The technological view of Information System's security 2.1. The Human view of Information System's security 3. Classifying attacks and managing countermeasures.
520 _aAn information system may be regarded as an organized set of resources, both technological and human. Security should take this specificity into consideration in order to ensure an overall security of information systems. The security of information systems is usually tackled in a technological perspective. This book proposes to focus not only on information systems' security in a technological perspective, but also in a human, managerial and organizational perspective.
590 _aJohn Wiley and Sons
_bWiley Online Library: Complete oBooks
650 0 _aComputer security.
650 0 _aComputer networks
_xSecurity measures.
650 6 _aS�ecurit�e informatique.
650 6 _aR�eseaux d'ordinateurs
_xS�ecurit�e
_xMesures.
650 7 _aCOMPUTERS
_xInternet
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xNetworking
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xSecurity
_xGeneral.
_2bisacsh
650 7 _aComputer networks
_xSecurity measures
_2fast
650 7 _aComputer security
_2fast
758 _ihas work:
_aInsider threats (Text)
_1https://id.oclc.org/worldcat/entity/E39PCFYbtTvKfhrHPVjX8gBvRC
_4https://id.oclc.org/worldcat/ontology/hasWork
776 0 8 _iPrint version:
_aArduin, Pierre-Emmanuel.
_tInsider threats.
_dLondon, England ; Hoboken, New Jersey : iSTE : Wiley, �2018
_hxxii, 129 pages
_kInformation Systems, Web and Pervasive Computing Series. Advances in Information Systems Set ; Volume 10
_z9781848219724
830 0 _aAdvances in information systems set ;
_vv. 10.
856 4 0 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785
938 _aAskews and Holts Library Services
_bASKH
_nAH34082997
938 _aAskews and Holts Library Services
_bASKH
_nAH34082996
938 _aEBSCOhost
_bEBSC
_n1734377
938 _aRecorded Books, LLC
_bRECE
_nrbeEB00722338
938 _aYBP Library Services
_bYANK
_n15229978
994 _a92
_bINLUM
999 _c12507
_d12507