Managing information security breaches: studies from real life
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Ely, Cambridgeshire, United Kingdom
IT Governance Publishing
2014
|
Ausgabe: | Second edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781849285964/?ar |
Beschreibung: | Description based on online resource; title from title page (Safari, viewed November 6, 2015) |
Umfang: | 1 Online-Ressource (1 volume) illustrations |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047742100 | ||
003 | DE-627-1 | ||
005 | 20240228115956.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2014 xx |||||o 00| ||eng c | ||
035 | |a (DE-627-1)047742100 | ||
035 | |a (DE-599)KEP047742100 | ||
035 | |a (ORHE)9781849285964 | ||
035 | |a (DE-627-1)047742100 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20230216 | |
100 | 1 | |a Krausz, Michael |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Managing information security breaches |b studies from real life |c Michael Krausz |
250 | |a Second edition. | ||
264 | 1 | |a Ely, Cambridgeshire, United Kingdom |b IT Governance Publishing |c 2014 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Description based on online resource; title from title page (Safari, viewed November 6, 2015) | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Computer crimes | |
650 | 0 | |a Electronic information resources |x Access control | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Criminalité informatique | |
650 | 4 | |a Sources d'information électroniques ; Accès ; Contrôle | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Electronic information resources ; Access control | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781849285964/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047742100 |
---|---|
_version_ | 1829007768850268160 |
adam_text | |
any_adam_object | |
author | Krausz, Michael |
author_facet | Krausz, Michael |
author_role | aut |
author_sort | Krausz, Michael |
author_variant | m k mk |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047742100 (DE-599)KEP047742100 (ORHE)9781849285964 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Second edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01805cam a22004812c 4500</leader><controlfield tag="001">ZDB-30-ORH-047742100</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115956.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2014 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047742100</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047742100</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781849285964</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047742100</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20230216</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Krausz, Michael</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Managing information security breaches</subfield><subfield code="b">studies from real life</subfield><subfield code="c">Michael Krausz</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely, Cambridgeshire, United Kingdom</subfield><subfield code="b">IT Governance Publishing</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from title page (Safari, viewed November 6, 2015)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic information resources</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sources d'information électroniques ; Accès ; Contrôle</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic information resources ; Access control</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781849285964/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047742100 |
illustrated | Illustrated |
indexdate | 2025-04-10T09:35:33Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | IT Governance Publishing |
record_format | marc |
spelling | Krausz, Michael VerfasserIn aut Managing information security breaches studies from real life Michael Krausz Second edition. Ely, Cambridgeshire, United Kingdom IT Governance Publishing 2014 1 Online-Ressource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Description based on online resource; title from title page (Safari, viewed November 6, 2015) Computer security Computer crimes Electronic information resources Access control Computer networks Security measures Computer Security Sécurité informatique Criminalité informatique Sources d'information électroniques ; Accès ; Contrôle Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures Electronic information resources ; Access control |
spellingShingle | Krausz, Michael Managing information security breaches studies from real life Computer security Computer crimes Electronic information resources Access control Computer networks Security measures Computer Security Sécurité informatique Criminalité informatique Sources d'information électroniques ; Accès ; Contrôle Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures Electronic information resources ; Access control |
title | Managing information security breaches studies from real life |
title_auth | Managing information security breaches studies from real life |
title_exact_search | Managing information security breaches studies from real life |
title_full | Managing information security breaches studies from real life Michael Krausz |
title_fullStr | Managing information security breaches studies from real life Michael Krausz |
title_full_unstemmed | Managing information security breaches studies from real life Michael Krausz |
title_short | Managing information security breaches |
title_sort | managing information security breaches studies from real life |
title_sub | studies from real life |
topic | Computer security Computer crimes Electronic information resources Access control Computer networks Security measures Computer Security Sécurité informatique Criminalité informatique Sources d'information électroniques ; Accès ; Contrôle Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures Electronic information resources ; Access control |
topic_facet | Computer security Computer crimes Electronic information resources Access control Computer networks Security measures Computer Security Sécurité informatique Criminalité informatique Sources d'information électroniques ; Accès ; Contrôle Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures Electronic information resources ; Access control |
work_keys_str_mv | AT krauszmichael managinginformationsecuritybreachesstudiesfromreallife |