Enterprise-Grade IT Security for Small and Medium Businesses: Building Security Systems, in Plain English
Gespeichert in:
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV048497118 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 221004s2022 xx o|||| 00||| eng d | ||
020 | |a 9781484286289 |c Online |9 978-1-4842-8628-9 | ||
024 | 7 | |a 10.1007/978-1-4842-8628-9 |2 doi | |
035 | |a (ZDB-2-CWD)9781484286289 | ||
035 | |a (OCoLC)1347223074 | ||
035 | |a (DE-599)BVBBV048497118 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-860 |a DE-1046 |a DE-1043 |a DE-Aug4 |a DE-898 |a DE-188 |a DE-523 |a DE-859 |a DE-863 |a DE-1050 |a DE-20 |a DE-1051 |a DE-862 |a DE-92 |a DE-355 |a DE-573 |a DE-M347 |a DE-706 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a DAT 000 |2 stub | ||
100 | 1 | |a Cherry, Denny |e Verfasser |4 aut | |
245 | 1 | 0 | |a Enterprise-Grade IT Security for Small and Medium Businesses |b Building Security Systems, in Plain English |c by Denny Cherry |
250 | |a 1st ed. 2022 | ||
264 | 1 | |a Berkeley, CA |b Apress |c 2022 | |
264 | 1 | |a Berkeley, CA |b Apress | |
300 | |a 1 Online-Ressource (XII, 153 p. 55 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 4 | |a Data and Information Security | |
650 | 4 | |a Mobile and Network Security | |
650 | 4 | |a IT Risk Management | |
650 | 4 | |a Principles and Models of Security | |
650 | 4 | |a Business IT Infrastructure | |
650 | 4 | |a Microsoft | |
650 | 4 | |a Data protection | |
650 | 4 | |a Computer networks—Security measures | |
650 | 4 | |a Risk management | |
650 | 4 | |a Computer security | |
650 | 4 | |a Information technology—Management | |
650 | 4 | |a Microsoft software | |
650 | 4 | |a Microsoft .NET Framework | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-4842-8627-2 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-4842-8629-6 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4842-8628-9 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-CWD | ||
940 | 1 | |q ZDB-2-CWD_2022 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-033874473 | |
966 | e | |u https://doi.org/10.1007/978-1-4842-8628-9 |l DE-1043 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-8628-9 |l DE-1046 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-8628-9 |l DE-Aug4 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-8628-9 |l DE-1050 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-8628-9 |l DE-573 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-8628-9 |l DE-M347 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-8628-9 |l DE-92 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-8628-9 |l DE-1051 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-8628-9 |l DE-898 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-8628-9 |l DE-859 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-8628-9 |l DE-860 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-8628-9 |l DE-863 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-8628-9 |l DE-862 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-8628-9 |l DE-523 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-8628-9 |l DE-355 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-8628-9 |l DE-20 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-8628-9 |l DE-706 |p ZDB-2-CWD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818989953359544320 |
---|---|
any_adam_object | |
author | Cherry, Denny |
author_facet | Cherry, Denny |
author_role | aut |
author_sort | Cherry, Denny |
author_variant | d c dc |
building | Verbundindex |
bvnumber | BV048497118 |
classification_tum | DAT 000 |
collection | ZDB-2-CWD |
ctrlnum | (ZDB-2-CWD)9781484286289 (OCoLC)1347223074 (DE-599)BVBBV048497118 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-1-4842-8628-9 |
edition | 1st ed. 2022 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03609nam a2200745zc 4500</leader><controlfield tag="001">BV048497118</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">221004s2022 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484286289</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-4842-8628-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4842-8628-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-CWD)9781484286289</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1347223074</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048497118</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-860</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cherry, Denny</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Enterprise-Grade IT Security for Small and Medium Businesses</subfield><subfield code="b">Building Security Systems, in Plain English</subfield><subfield code="c">by Denny Cherry</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2022</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berkeley, CA</subfield><subfield code="b">Apress</subfield><subfield code="c">2022</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berkeley, CA</subfield><subfield code="b">Apress</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XII, 153 p. 55 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data and Information Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile and Network Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IT Risk Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Principles and Models of Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business IT Infrastructure</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Microsoft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks—Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology—Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Microsoft software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Microsoft .NET Framework</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-4842-8627-2</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-4842-8629-6</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4842-8628-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-CWD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-CWD_2022</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033874473</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-8628-9</subfield><subfield code="l">DE-1043</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-8628-9</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-8628-9</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-8628-9</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-8628-9</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-8628-9</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-8628-9</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-8628-9</subfield><subfield code="l">DE-1051</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-8628-9</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-8628-9</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-8628-9</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-8628-9</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-8628-9</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-8628-9</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-8628-9</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-8628-9</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-8628-9</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV048497118 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T19:46:40Z |
institution | BVB |
isbn | 9781484286289 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033874473 |
oclc_num | 1347223074 |
open_access_boolean | |
owner | DE-860 DE-1046 DE-1043 DE-Aug4 DE-898 DE-BY-UBR DE-188 DE-523 DE-859 DE-863 DE-BY-FWS DE-1050 DE-20 DE-1051 DE-862 DE-BY-FWS DE-92 DE-355 DE-BY-UBR DE-573 DE-M347 DE-706 |
owner_facet | DE-860 DE-1046 DE-1043 DE-Aug4 DE-898 DE-BY-UBR DE-188 DE-523 DE-859 DE-863 DE-BY-FWS DE-1050 DE-20 DE-1051 DE-862 DE-BY-FWS DE-92 DE-355 DE-BY-UBR DE-573 DE-M347 DE-706 |
physical | 1 Online-Ressource (XII, 153 p. 55 illus) |
psigel | ZDB-2-CWD ZDB-2-CWD_2022 |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Apress |
record_format | marc |
spelling | Cherry, Denny Verfasser aut Enterprise-Grade IT Security for Small and Medium Businesses Building Security Systems, in Plain English by Denny Cherry 1st ed. 2022 Berkeley, CA Apress 2022 Berkeley, CA Apress 1 Online-Ressource (XII, 153 p. 55 illus) txt rdacontent c rdamedia cr rdacarrier Data and Information Security Mobile and Network Security IT Risk Management Principles and Models of Security Business IT Infrastructure Microsoft Data protection Computer networks—Security measures Risk management Computer security Information technology—Management Microsoft software Microsoft .NET Framework Erscheint auch als Druck-Ausgabe 978-1-4842-8627-2 Erscheint auch als Druck-Ausgabe 978-1-4842-8629-6 https://doi.org/10.1007/978-1-4842-8628-9 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Cherry, Denny Enterprise-Grade IT Security for Small and Medium Businesses Building Security Systems, in Plain English Data and Information Security Mobile and Network Security IT Risk Management Principles and Models of Security Business IT Infrastructure Microsoft Data protection Computer networks—Security measures Risk management Computer security Information technology—Management Microsoft software Microsoft .NET Framework |
title | Enterprise-Grade IT Security for Small and Medium Businesses Building Security Systems, in Plain English |
title_auth | Enterprise-Grade IT Security for Small and Medium Businesses Building Security Systems, in Plain English |
title_exact_search | Enterprise-Grade IT Security for Small and Medium Businesses Building Security Systems, in Plain English |
title_full | Enterprise-Grade IT Security for Small and Medium Businesses Building Security Systems, in Plain English by Denny Cherry |
title_fullStr | Enterprise-Grade IT Security for Small and Medium Businesses Building Security Systems, in Plain English by Denny Cherry |
title_full_unstemmed | Enterprise-Grade IT Security for Small and Medium Businesses Building Security Systems, in Plain English by Denny Cherry |
title_short | Enterprise-Grade IT Security for Small and Medium Businesses |
title_sort | enterprise grade it security for small and medium businesses building security systems in plain english |
title_sub | Building Security Systems, in Plain English |
topic | Data and Information Security Mobile and Network Security IT Risk Management Principles and Models of Security Business IT Infrastructure Microsoft Data protection Computer networks—Security measures Risk management Computer security Information technology—Management Microsoft software Microsoft .NET Framework |
topic_facet | Data and Information Security Mobile and Network Security IT Risk Management Principles and Models of Security Business IT Infrastructure Microsoft Data protection Computer networks—Security measures Risk management Computer security Information technology—Management Microsoft software Microsoft .NET Framework |
url | https://doi.org/10.1007/978-1-4842-8628-9 |
work_keys_str_mv | AT cherrydenny enterprisegradeitsecurityforsmallandmediumbusinessesbuildingsecuritysystemsinplainenglish |