E-mail Security: a Pocket Guide
This pocket guide will help businesses to address the most important issues. Its comprehensive approach covers both the technical and the managerial aspects of the subject, offering valuable insights for IT professionals, managers and executives, as well as for individual users of e-mail.
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Ely
IT Governance Pub.
2010
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781849280976/?ar |
Zusammenfassung: | This pocket guide will help businesses to address the most important issues. Its comprehensive approach covers both the technical and the managerial aspects of the subject, offering valuable insights for IT professionals, managers and executives, as well as for individual users of e-mail. |
Beschreibung: | Includes bibliographical references. - Print version record |
Umfang: | 1 Online-Ressource (100 Seiten) |
ISBN: | 9781849280976 1849280975 1849280967 9781849280969 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-051690969 | ||
003 | DE-627-1 | ||
005 | 20240228114711.0 | ||
007 | cr uuu---uuuuu | ||
008 | 200417s2010 xx |||||o 00| ||eng c | ||
020 | |a 9781849280976 |c electronic bk. |9 978-1-84928-097-6 | ||
020 | |a 1849280975 |c electronic bk. |9 1-84928-097-5 | ||
020 | |a 1849280967 |9 1-84928-096-7 | ||
020 | |a 9781849280969 |9 978-1-84928-096-9 | ||
035 | |a (DE-627-1)051690969 | ||
035 | |a (DE-599)KEP051690969 | ||
035 | |a (ORHE)9781849280976 | ||
035 | |a (DE-627-1)051690969 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM084020 |2 bisacsh | |
072 | 7 | |a COM053000 |2 bisacsh | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Furnell, Steven |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a E-mail Security |b a Pocket Guide |
264 | 1 | |a Ely |b IT Governance Pub. |c 2010 | |
300 | |a 1 Online-Ressource (100 Seiten) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references. - Print version record | ||
520 | |a This pocket guide will help businesses to address the most important issues. Its comprehensive approach covers both the technical and the managerial aspects of the subject, offering valuable insights for IT professionals, managers and executives, as well as for individual users of e-mail. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Electronic mail systems |x Security measures | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a COMPUTERS ; Desktop Applications ; Email Clients | |
650 | 4 | |a Computer security | |
650 | 4 | |a Electronic mail systems ; Security measures | |
700 | 1 | |a Dowland, Paul S. |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9781849280969 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781849280969 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781849280976/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-051690969 |
---|---|
_version_ | 1821494843086471168 |
adam_text | |
any_adam_object | |
author | Furnell, Steven |
author2 | Dowland, Paul S. |
author2_role | ctb |
author2_variant | p s d ps psd |
author_facet | Furnell, Steven Dowland, Paul S. |
author_role | aut |
author_sort | Furnell, Steven |
author_variant | s f sf |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)051690969 (DE-599)KEP051690969 (ORHE)9781849280976 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02323cam a22006012 4500</leader><controlfield tag="001">ZDB-30-ORH-051690969</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114711.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">200417s2010 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849280976</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-84928-097-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849280975</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-84928-097-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849280967</subfield><subfield code="9">1-84928-096-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849280969</subfield><subfield code="9">978-1-84928-096-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051690969</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP051690969</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781849280976</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051690969</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM084020</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Furnell, Steven</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">E-mail Security</subfield><subfield code="b">a Pocket Guide</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely</subfield><subfield code="b">IT Governance Pub.</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (100 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This pocket guide will help businesses to address the most important issues. Its comprehensive approach covers both the technical and the managerial aspects of the subject, offering valuable insights for IT professionals, managers and executives, as well as for individual users of e-mail.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic mail systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Desktop Applications ; Email Clients</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic mail systems ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dowland, Paul S.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781849280969</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781849280969</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781849280976/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-051690969 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:20:49Z |
institution | BVB |
isbn | 9781849280976 1849280975 1849280967 9781849280969 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (100 Seiten) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | IT Governance Pub. |
record_format | marc |
spelling | Furnell, Steven VerfasserIn aut E-mail Security a Pocket Guide Ely IT Governance Pub. 2010 1 Online-Ressource (100 Seiten) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references. - Print version record This pocket guide will help businesses to address the most important issues. Its comprehensive approach covers both the technical and the managerial aspects of the subject, offering valuable insights for IT professionals, managers and executives, as well as for individual users of e-mail. Computer security Electronic mail systems Security measures Computer Security Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General COMPUTERS ; Desktop Applications ; Email Clients Electronic mail systems ; Security measures Dowland, Paul S. MitwirkendeR ctb 9781849280969 Erscheint auch als Druck-Ausgabe 9781849280969 |
spellingShingle | Furnell, Steven E-mail Security a Pocket Guide Computer security Electronic mail systems Security measures Computer Security Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General COMPUTERS ; Desktop Applications ; Email Clients Electronic mail systems ; Security measures |
title | E-mail Security a Pocket Guide |
title_auth | E-mail Security a Pocket Guide |
title_exact_search | E-mail Security a Pocket Guide |
title_full | E-mail Security a Pocket Guide |
title_fullStr | E-mail Security a Pocket Guide |
title_full_unstemmed | E-mail Security a Pocket Guide |
title_short | E-mail Security |
title_sort | e mail security a pocket guide |
title_sub | a Pocket Guide |
topic | Computer security Electronic mail systems Security measures Computer Security Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General COMPUTERS ; Desktop Applications ; Email Clients Electronic mail systems ; Security measures |
topic_facet | Computer security Electronic mail systems Security measures Computer Security Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General COMPUTERS ; Desktop Applications ; Email Clients Electronic mail systems ; Security measures |
work_keys_str_mv | AT furnellsteven emailsecurityapocketguide AT dowlandpauls emailsecurityapocketguide |