It looks like you're offline.
Open Library logo
additional options menu

MARC Record from marc_nuls

Record ID marc_nuls/NULS_PHC_180925.mrc:201514603:1820
Source marc_nuls
Download Link /show-records/marc_nuls/NULS_PHC_180925.mrc:201514603:1820?format=raw

LEADER: 01820cam 22003254a 4500
001 9920377770001661
005 20150423125705.0
008 010427s2001 nyua b 001 0 eng
010 $a 2001032698
020 $a0071379665 (alk. paper)
035 $a(CSdNU)u98879-01national_inst
035 $a(Sirsi) l2001032698
035 $a(Sirsi) l2001032698
035 $a(Sirsi) 01-AAM-4129
035 $a 2001032698
040 $aDLC$cDLC$dDLC$dOrPss
042 $apcc
050 00 $aHD 30.38$bM333 2001
100 1 $aMcCarthy, Mary Pat.
245 10 $aSecurity transformation :$bdigital defense strategies to protect your company's reputation and market share /$cMary Pat McCarthy, Stuart Campbell ; with Rob Brownstein.
260 $aNew York :$bMcGraw-Hill,$cc2001.
300 $axii, 211 p. :$bill. ;$c24 cm.
504 $aIncludes bibliographical references and index.
505 0 $aAre You Scared Yet? -- The World under Siege -- Just When We Thought It Was Safe... -- The Benefits -- A Business Enabler -- It's All about Trust -- The Approach -- A Multifaceted Process -- Prevention, Detection, and Response -- The Underpinnings -- Assessing the Security Risk -- Your Enterprise Security Architecture -- Peering Ahead -- Taking Back Control -- Privacy and Security -- New Strategies of Success in E-Business: Managing Risks to Protect Brand, Retain Customers, and Enhance Market Capitalization -- E-Commerce and Cyber Crime: New Strategies for Managing the Risks of Exploitation.
650 0 $aBusiness enterprises$xComputer networks$xSecurity measures.
650 0 $aComputer security.
700 1 $aCampbell, Stuart.
700 1 $aBrownstein, Rob.
948 $a11/14/2001$b11/29/2001
999 $aHD 30.38 M333 2001$wLC$c1$i31786101662119$d3/8/2004$f3/8/2004$g1 $lCIRCSTACKS$mNULS$n1$rY$sY$tBOOK$u11/29/2001