Internet and intranet security management : risks and solutions /

Saved in:
Bibliographic Details
Author / Creator:Janczewski, Lech, 1943-
Imprint:Hershey : Idea Group Pub., c2000.
Description:302 p. : ill. ; 25 cm.
Language:English
Subject:
Format: Print Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/4178719
Hidden Bibliographic Details
ISBN:1878289713
Notes:Includes bibliographical references and index.
committed to retain 20170930 20421213 HathiTrust

MARC

LEADER 00000pam a22000004a 4500
001 4178719
003 ICU
005 20030529115800.0
008 000207s2000 paua b 001 0 eng
010 |a  00022538  
020 |a 1878289713 
035 |a 22538 
040 |a DLC  |c DLC  |d NhCcYBP  |d OrLoB-B  |d OCoLC 
042 |a pcc 
050 0 0 |a TK5105.875.I57  |b J358 2000 
082 0 0 |a 005.8  |2 21 
100 1 |a Janczewski, Lech,  |d 1943-  |0 http://id.loc.gov/authorities/names/n00001655  |1 http://viaf.org/viaf/117734347 
245 1 0 |a Internet and intranet security management :  |b risks and solutions /  |c Lech Janczewski. 
260 |a Hershey :  |b Idea Group Pub.,  |c c2000. 
300 |a 302 p. :  |b ill. ;  |c 25 cm. 
336 |a text  |b txt  |2 rdacontent  |0 http://id.loc.gov/vocabulary/contentTypes/txt 
337 |a unmediated  |b n  |2 rdamedia  |0 http://id.loc.gov/vocabulary/mediaTypes/n 
338 |a volume  |b nc  |2 rdacarrier  |0 http://id.loc.gov/vocabulary/carriers/nc 
504 |a Includes bibliographical references and index. 
505 0 0 |g Pt. I.  |t State of the Art.  |g Ch. 1.  |t Security Risk Assessment and Electronic Commerce: A Cross-Industry Analysis /  |r Jonathan W. Palmer, Jamie Kliewer and Mark Sweat.  |g Ch. 2.  |t Securing the Internet in New Zealand: Threats and Solutions /  |r Jairo A. Gutierrez --  |g Pt. II.  |t Managing Intranet and Internet Security.  |g Ch. 3.  |t Developing Trust for Electronic Commerce /  |r Dieter Fink.  |g Ch. 4.  |t Managing Security Functions Using Security Standards /  |r Lech Janczewski.  |g Ch. 5.  |t Managing Security in the World Wide Web: Architecture, Services and Techniques /  |r Fredj Dridi and Gustaf Neumann --  |g Pt. III.  |t Cryptography and Technical Security Standards.  |g Ch. 6.  |t Cryptography: Protecting Confidentiality, Integrity and Availability of Data /  |r Henry B. Wolfe.  |g Ch. 7.  |t Foundations for Cryptography /  |r Dieter Gollmann.  |g Ch. 8.  |t Developments in Security Mechanism Standards /  |r Chris Mitchell --  |g Pt. IV.  |t Security and the Law.  |g Ch. 9.  |t Electronic Mail, Employee Privacy and the Workplace /  |r Charles Prysby and Nicole Prysby.  |g Ch. 10.  |t Protecting Personal Privacy in Cyberspace: The Limitations of Third Generation Data Protection Laws Such as the New Zealand Privacy Act 1993 /  |r Gehan Gunasekara. 
583 1 |a committed to retain  |c 20170930  |d 20421213  |f HathiTrust  |5 ICU 
650 0 |a Internet  |x Security measures.  |0 http://id.loc.gov/authorities/subjects/sh2008104644 
650 0 |a Intranets (Computer networks)  |x Security measures. 
650 0 |a Computers  |x Access control.  |0 http://id.loc.gov/authorities/subjects/sh85029553 
650 0 |a Cryptography.  |0 http://id.loc.gov/authorities/subjects/sh85034453 
650 7 |a Computers  |x Access control.  |2 fast  |0 http://id.worldcat.org/fast/fst00872779 
650 7 |a Cryptography.  |2 fast  |0 http://id.worldcat.org/fast/fst00884552 
650 7 |a Internet  |x Security measures.  |2 fast  |0 http://id.worldcat.org/fast/fst01751426 
650 7 |a Intranets (Computer networks)  |x Security measures.  |2 fast  |0 http://id.worldcat.org/fast/fst00977786 
901 |a ToCBNA 
903 |a HeVa 
903 |a Hathi 
035 |a (OCoLC)43434725 
929 |a cat 
999 f f |i 29149a31-63eb-5f34-901b-9317359bc824  |s 47b625e3-125e-5b68-9e61-14e69ca414bf 
928 |t Library of Congress classification  |a TK5105.875.I57J358 2000  |l JCL  |c JCL-Sci  |i 4669514 
927 |t Library of Congress classification  |a TK5105.875.I57J358 2000  |l JCL  |c JCL-Sci  |e CRERAR  |b 53846690  |i 6662901