Record ID | marc_loc_2016/BooksAll.2016.part35.utf8:105269985:1222 |
Source | Library of Congress |
Download Link | /show-records/marc_loc_2016/BooksAll.2016.part35.utf8:105269985:1222?format=raw |
LEADER: 01222cam a22003377a 4500
001 2008010630
003 DLC
005 20090901091052.0
008 080306s2008 flua b 001 0 eng
010 $a 2008010630
015 $aGBA822857$2bnb
016 7 $a014531082$2Uk
020 $a9780849380679 (hardback : alk. paper)
035 $a(OCoLC)ocn212431622
035 $a(OCoLC)212431622$z(OCoLC)150368689
040 $aDLC$cDLC$dUKM$dBTCTA$dBAKER$dYDXCP$dC#P$dBWX$dCDX$dDLC
050 00 $aQA76.9.A25$bW5487 2008
082 00 $a005.8$222
100 1 $aWillett, Keith D.
245 10 $aInformation assurance architecture /$cKeith D. WIllett.
260 $aBoca Raton :$bCRC Press,$cc2008.
300 $axxix, 588 p. :$bill. ;$c25 cm.
500 $a"An Auerbach book."
504 $aIncludes bibliographical references (p. 555-557) and index.
650 0 $aComputer security.
650 0 $aComputer networks$xSecurity measures.
650 0 $aInformation resources management.
650 0 $aInformation technology$xManagement.
650 0 $aBusiness enterprises$xCommunication systems$xManagement.
650 0 $aData protection.
856 41 $3Table of contents only$uhttp://www.loc.gov/catdir/toc/ecip0813/2008010630.html