|
|
|
|
LEADER |
00000pam a22000004a 4500 |
001 |
4178719 |
003 |
ICU |
005 |
20030529115800.0 |
008 |
000207s2000 paua b 001 0 eng |
010 |
|
|
|a 00022538
|
020 |
|
|
|a 1878289713
|
035 |
|
|
|a 22538
|
040 |
|
|
|a DLC
|c DLC
|d NhCcYBP
|d OrLoB-B
|d OCoLC
|
042 |
|
|
|a pcc
|
050 |
0 |
0 |
|a TK5105.875.I57
|b J358 2000
|
082 |
0 |
0 |
|a 005.8
|2 21
|
100 |
1 |
|
|a Janczewski, Lech,
|d 1943-
|0 http://id.loc.gov/authorities/names/n00001655
|1 http://viaf.org/viaf/117734347
|
245 |
1 |
0 |
|a Internet and intranet security management :
|b risks and solutions /
|c Lech Janczewski.
|
260 |
|
|
|a Hershey :
|b Idea Group Pub.,
|c c2000.
|
300 |
|
|
|a 302 p. :
|b ill. ;
|c 25 cm.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|0 http://id.loc.gov/vocabulary/contentTypes/txt
|
337 |
|
|
|a unmediated
|b n
|2 rdamedia
|0 http://id.loc.gov/vocabulary/mediaTypes/n
|
338 |
|
|
|a volume
|b nc
|2 rdacarrier
|0 http://id.loc.gov/vocabulary/carriers/nc
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
0 |
|g Pt. I.
|t State of the Art.
|g Ch. 1.
|t Security Risk Assessment and Electronic Commerce: A Cross-Industry Analysis /
|r Jonathan W. Palmer, Jamie Kliewer and Mark Sweat.
|g Ch. 2.
|t Securing the Internet in New Zealand: Threats and Solutions /
|r Jairo A. Gutierrez --
|g Pt. II.
|t Managing Intranet and Internet Security.
|g Ch. 3.
|t Developing Trust for Electronic Commerce /
|r Dieter Fink.
|g Ch. 4.
|t Managing Security Functions Using Security Standards /
|r Lech Janczewski.
|g Ch. 5.
|t Managing Security in the World Wide Web: Architecture, Services and Techniques /
|r Fredj Dridi and Gustaf Neumann --
|g Pt. III.
|t Cryptography and Technical Security Standards.
|g Ch. 6.
|t Cryptography: Protecting Confidentiality, Integrity and Availability of Data /
|r Henry B. Wolfe.
|g Ch. 7.
|t Foundations for Cryptography /
|r Dieter Gollmann.
|g Ch. 8.
|t Developments in Security Mechanism Standards /
|r Chris Mitchell --
|g Pt. IV.
|t Security and the Law.
|g Ch. 9.
|t Electronic Mail, Employee Privacy and the Workplace /
|r Charles Prysby and Nicole Prysby.
|g Ch. 10.
|t Protecting Personal Privacy in Cyberspace: The Limitations of Third Generation Data Protection Laws Such as the New Zealand Privacy Act 1993 /
|r Gehan Gunasekara.
|
583 |
1 |
|
|a committed to retain
|c 20170930
|d 20421213
|f HathiTrust
|5 ICU
|
650 |
|
0 |
|a Internet
|x Security measures.
|0 http://id.loc.gov/authorities/subjects/sh2008104644
|
650 |
|
0 |
|a Intranets (Computer networks)
|x Security measures.
|
650 |
|
0 |
|a Computers
|x Access control.
|0 http://id.loc.gov/authorities/subjects/sh85029553
|
650 |
|
0 |
|a Cryptography.
|0 http://id.loc.gov/authorities/subjects/sh85034453
|
650 |
|
7 |
|a Computers
|x Access control.
|2 fast
|0 http://id.worldcat.org/fast/fst00872779
|
650 |
|
7 |
|a Cryptography.
|2 fast
|0 http://id.worldcat.org/fast/fst00884552
|
650 |
|
7 |
|a Internet
|x Security measures.
|2 fast
|0 http://id.worldcat.org/fast/fst01751426
|
650 |
|
7 |
|a Intranets (Computer networks)
|x Security measures.
|2 fast
|0 http://id.worldcat.org/fast/fst00977786
|
901 |
|
|
|a ToCBNA
|
903 |
|
|
|a HeVa
|
903 |
|
|
|a Hathi
|
035 |
|
|
|a (OCoLC)43434725
|
929 |
|
|
|a cat
|
999 |
f |
f |
|i 29149a31-63eb-5f34-901b-9317359bc824
|s 47b625e3-125e-5b68-9e61-14e69ca414bf
|
928 |
|
|
|t Library of Congress classification
|a TK5105.875.I57J358 2000
|l JCL
|c JCL-Sci
|i 4669514
|
927 |
|
|
|t Library of Congress classification
|a TK5105.875.I57J358 2000
|l JCL
|c JCL-Sci
|e CRERAR
|b 53846690
|i 6662901
|