000 | 04033cam a2200745 i 4500 | ||
---|---|---|---|
001 | on1029054952 | ||
003 | OCoLC | ||
005 | 20240523125540.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 180320s2018 enk ob 001 0 eng d | ||
040 |
_aN$T _beng _erda _epn _cN$T _dN$T _dNLE _dDG1 _dRECBK _dOCLCA _dUPM _dOCLCF _dUAB _dOCLCQ _dUMR _dOCLCQ _dU3W _dOCLCQ _dESU _dYDX _dUKAHL _dOCLCQ _dBWN _dOCLCQ _dOCLCO _dK6U _dOCLCQ _dOCLCO _dOCLCL |
||
019 |
_a1088884961 _a1165740134 _a1175676344 |
||
020 |
_a9781119516477 _q(electronic bk.) |
||
020 |
_a1119516471 _q(electronic bk.) |
||
020 |
_a9781119419785 _q(electronic bk.) |
||
020 |
_a1119419786 _q(electronic bk.) |
||
020 | _a1848219725 | ||
020 | _a9781848219724 | ||
020 | _z9781848219724 | ||
029 | 1 |
_aAU@ _b000062880864 |
|
029 | 1 |
_aCHNEW _b001003216 |
|
029 | 1 |
_aCHVBK _b516429310 |
|
029 | 1 |
_aAU@ _b000072394074 |
|
035 |
_a(OCoLC)1029054952 _z(OCoLC)1088884961 _z(OCoLC)1165740134 _z(OCoLC)1175676344 |
||
037 |
_a5323674 _bProquest Ebook Central |
||
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aCOM _x060040 _2bisacsh |
|
072 | 7 |
_aCOM _x043050 _2bisacsh |
|
072 | 7 |
_aCOM _x053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
049 | _aMAIN | ||
100 | 1 |
_aArduin, Pierre-Emmanuel, _eauthor. |
|
245 | 1 | 0 |
_aInsider threats / _cPierre-Emmanuel Arduin. |
264 | 1 |
_aLondon : _bISTE Ltd. ; _aHoboken, NJ : _bJohn Wiley & Sons, Inc., _c2018. |
|
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 1 |
_aAdvances in information systems set ; _vvolume 10 |
|
588 | 0 | _aOnline resource; title from PDF title page (EBSCO, viewed March 26, 2018). | |
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _a1. Information Systems 1.1. The technological point of view -- managing computers 1.2. The Human point of view -- managing individuals 2. Security 2.1. The technological view of Information System's security 2.1. The Human view of Information System's security 3. Classifying attacks and managing countermeasures. | |
520 | _aAn information system may be regarded as an organized set of resources, both technological and human. Security should take this specificity into consideration in order to ensure an overall security of information systems. The security of information systems is usually tackled in a technological perspective. This book proposes to focus not only on information systems' security in a technological perspective, but also in a human, managerial and organizational perspective. | ||
590 |
_aJohn Wiley and Sons _bWiley Online Library: Complete oBooks |
||
650 | 0 | _aComputer security. | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 6 | _aS�ecurit�e informatique. | |
650 | 6 |
_aR�eseaux d'ordinateurs _xS�ecurit�e _xMesures. |
|
650 | 7 |
_aCOMPUTERS _xInternet _xSecurity. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xNetworking _xSecurity. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xSecurity _xGeneral. _2bisacsh |
|
650 | 7 |
_aComputer networks _xSecurity measures _2fast |
|
650 | 7 |
_aComputer security _2fast |
|
758 |
_ihas work: _aInsider threats (Text) _1https://id.oclc.org/worldcat/entity/E39PCFYbtTvKfhrHPVjX8gBvRC _4https://id.oclc.org/worldcat/ontology/hasWork |
||
776 | 0 | 8 |
_iPrint version: _aArduin, Pierre-Emmanuel. _tInsider threats. _dLondon, England ; Hoboken, New Jersey : iSTE : Wiley, �2018 _hxxii, 129 pages _kInformation Systems, Web and Pervasive Computing Series. Advances in Information Systems Set ; Volume 10 _z9781848219724 |
830 | 0 |
_aAdvances in information systems set ; _vv. 10. |
|
856 | 4 | 0 | _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785 |
938 |
_aAskews and Holts Library Services _bASKH _nAH34082997 |
||
938 |
_aAskews and Holts Library Services _bASKH _nAH34082996 |
||
938 |
_aEBSCOhost _bEBSC _n1734377 |
||
938 |
_aRecorded Books, LLC _bRECE _nrbeEB00722338 |
||
938 |
_aYBP Library Services _bYANK _n15229978 |
||
994 |
_a92 _bINLUM |
||
999 |
_c12507 _d12507 |