000 | 01303nam a2200217Ia 4500 | ||
---|---|---|---|
003 | OSt | ||
005 | 20140909134035.0 | ||
008 | 140223b2012 xxu||||| |||| 00| 0 eng d | ||
020 |
_a9781435481695 _c0.00 |
||
040 | _c | ||
082 |
_a005.8 _bSHO |
||
100 | _aShoemaker, Dan | ||
245 | _aCybersecurity: The Essential Body of Knowledge | ||
260 |
_aUSA _bCengage Learning _c2012 |
||
300 | _a500p | ||
500 | _aInformation Security is Important. A Global Road Map for Security Adapting Best Practice: Tailoring a Solution that Fits Defining the Company's Executive Roles Defining the Company's Functional Security Roles Defining the Corollary Roles for Security The Data Security Competency The Digital Forensics Competency The Enterprise Continuity Competency The Incident Management Competency IT Security Training and Awareness Securing the IT Systems Operations and Maintenance Function Network and Telecommunications Security Personnel Security Physical Security Procurement Legal and Regulatory Compliance The Risk Management Competency Strategic Management System and Application Security | ||
600 | _aComputer security - Textbooks | ||
700 | _aConklin, Wm. Arthur | ||
942 |
_2ddc _cLB |
||
999 |
_c59936 _d59936 |