Record ID | marc_columbia/Columbia-extract-20221130-009.mrc:250302796:4248 |
Source | marc_columbia |
Download Link | /show-records/marc_columbia/Columbia-extract-20221130-009.mrc:250302796:4248?format=raw |
LEADER: 04248cam a2200565Ma 4500
001 4240495
005 20220326225408.0
006 m o d
007 cr cn|||||||||
008 010810s2001 paua ob 001 0 eng d
010 $a 2021696167
035 $a(OCoLC)ocm48139537
035 $a(NNC)4240495
040 $aN$T$beng$epn$cN$T$dOCLCQ$dYDXCP$dOCLCG$dOCLCQ$dEXW$dOCLCQ$dTUU$dOCLCQ$dTNF$dVVN$dB24X7$dREDDC$dBTCTA$dHS0$dE7B$dMERUC$dOCLCQ$dZCU$dOCLCO$dOCLCF$dOCLCQ$dOCLCO$dIDEBK$dOCLCQ$dQE2$dOCLCQ$dMWM$dSUR$dZ5A$dLIV$dOCLCQ$dSAV$dVT2$dQT7$dOCLCA$dLUE$dOCLCQ$dINT$dTOF$dOCLCQ$dUMK$dAU@$dCHBRC$dINARC$dUKEHC$dOCLCO$dDLC$dOCLCO
019 $a50121193$a70759009$a399716784$a456152778$a533335204$a559663355$a606017924$a646711492$a888638908$a961656463$a962603022$a970752142$a984884690$a1005799650$a1007370190$a1053005347$a1058244097$a1108904516$a1135379474$a1200058533$a1298206482$a1298711105
020 $a058537659X$q(electronic bk.)
020 $a9780585376592$q(electronic bk.)
020 $a1930708866
020 $a9781930708860
020 $a1878289780
020 $a9781878289780
035 $a(OCoLC)48139537$z(OCoLC)50121193$z(OCoLC)70759009$z(OCoLC)399716784$z(OCoLC)456152778$z(OCoLC)533335204$z(OCoLC)559663355$z(OCoLC)606017924$z(OCoLC)646711492$z(OCoLC)888638908$z(OCoLC)961656463$z(OCoLC)962603022$z(OCoLC)970752142$z(OCoLC)984884690$z(OCoLC)1005799650$z(OCoLC)1007370190$z(OCoLC)1053005347$z(OCoLC)1058244097$z(OCoLC)1108904516$z(OCoLC)1135379474$z(OCoLC)1200058533$z(OCoLC)1298206482$z(OCoLC)1298711105
050 4 $aQA76.9.A25$bI54154 2001eb
072 7 $aCOM$x060040$2bisacsh
072 7 $aCOM$x043050$2bisacsh
072 7 $aCOM$x053000$2bisacsh
082 04 $a005.8$221
049 $aZCUA
245 00 $aInformation security management :$bglobal challenges in the new millennium /$c[edited by] Gurpreet Dhillon.
246 3 $aGlobal challenges in the new millennium
260 $aHershey, Pa. :$bIdea Group Pub.,$c2001.
300 $a1 online resource (ii, 184 pages) :$billustrations
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
504 $aIncludes bibliographical references and index.
505 00 $tChallenges in Managing Information Security in the New Millennium /$rGurpreet Dhillon --$tInformation Systems Security and the Need for Policy /$rMichael E. Whitman, Anthony M. Townsend, Robert J. Aalberts --$tNew Millennium; New Technology; Same Old Right and Wrong /$rJoseph T. Gilbert --$tEthical Elements of Security and Developments in Cyberspace that Should Promote Trust in Electronic Commerce /$rAndrew Storey, J. Barrie Thompson, Albert Bokma --$tCyber Terrorism and the Contemporary Corporation /$rMatthew Warren, William Hutchinson --$tAddressing Prescription Fraud in the British National Health Service: Technological and Social Considerations /$rAthanasia Pouloudi --$tThe Irish Experience with Disaster Recovery Planning: High Levels of Awareness May Not Suffice /$rFrederic Adam, Joseph A. Haslam --$tAn Analysis of the Recent IS Security Development Approaches: Descriptive and Prescriptive Implications /$rMikko T. Siponen --$tInternet and E-Business Security /$rKeng Siau, Kent Whitacre --$tAssurance and Compliance Monitoring Support /$rPeter Goldschmidt --$tIntelligent Software Agents: Security Issues of a New Technology /$rStefan Kirn, Mathias Petsch, Brian Lees --$tPrinciples for Managing Information Security in the New Millennium /$rGurpreet Dhillon.
588 0 $aPrint version record.
546 $aEnglish.
650 0 $aComputer security$xManagement.
650 6 $aSécurité informatique$xGestion.
650 7 $aCOMPUTERS$xInternet$xSecurity.$2bisacsh
650 7 $aCOMPUTERS$xNetworking$xSecurity.$2bisacsh
650 7 $aCOMPUTERS$xSecurity$xGeneral.$2bisacsh
650 7 $aComputer security$xManagement.$2fast$0(OCoLC)fst00872493
655 4 $aElectronic books.
700 1 $aDhillon, Gurpreet,$d1963-
776 08 $iPrint version:$tInformation security management.$dHershey, Pa. : Idea Group Pub., 2001$z1878289780$w(DLC) 00050544$w(OCoLC)45162162
856 40 $uhttp://www.columbia.edu/cgi-bin/cul/resolve?clio4240495$zAll EBSCO eBooks
852 8 $blweb$hEBOOKS