|
|
|
|
LEADER |
02799nam a2200445 a 4500 |
001 |
29686 |
003 |
IGIG |
005 |
20100714155851.0 |
006 |
m e d |
007 |
cr bn||||m|||a |
008 |
100626s2004 paua fsb 001 0 eng d |
010 |
# |
# |
|z 2004005871
|
020 |
# |
# |
|z 1591402476 (pbk.)
|
020 |
# |
# |
|a 1591402484 (ebook)
|
020 |
# |
# |
|a 9781591402480 (ebook)
|
024 |
7 |
# |
|a 10.4018/978-1-59140-247-3
|2 doi
|
035 |
# |
# |
|a (CaBNVSL)gtp00541790
|
035 |
# |
# |
|a (OCoLC)707612109
|
040 |
# |
# |
|a CaBNVSL
|c CaBNVSL
|d CaBNVSL
|
050 |
# |
4 |
|a QA76.9.A25
|b O64 2004e
|
082 |
0 |
4 |
|a 005.8
|2 22
|
100 |
1 |
# |
|a Oliva, Lawrence M.
|
245 |
1 |
0 |
|a IT security
|b advice from experts /
|c Lawrence M. Oliva.
|h [electronic resource] :
|
246 |
1 |
4 |
|a Information technology security.
|
260 |
# |
# |
|a Hershey, Pa. :
|b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
|c 2004.
|
300 |
# |
# |
|a electronic texts (ix, 171 p. : ill.) :
|b digital files.
|
490 |
1 |
# |
|a IT solutions series
|
504 |
# |
# |
|a Includes bibliographical references (p. 152-165) and index.
|
505 |
0 |
# |
|a 1. Executive overview/ Lawrence M. Oliva -- Section I. Governance issues -- 2. Aligning assurance requirements, countermeasures, and business / Craig E. Kaucher -- 3. Protecting customer provided information / Charles Rex IV -- 4. Global IT risk management strategies / Chrisan Herrod -- Section II. Architecture issues -- 5. Architecture issues / Lawrence M. Oliva -- Section III. Technology issues -- 6. Wireless information security / Clifton Poole -- 7. Reference materials -- About the authors -- Index.
|
506 |
# |
# |
|a Restricted to subscribers or individual electronic text purchasers.
|
520 |
3 |
# |
|a Increasing every day in frequency and sophistication, planned cyber attacks are impacting systems, data and user access at virtually every business and government organization. Whether accidentally triggered by users opening their daily e-mail, or planned denial of services attack triggering a thousand zombie systems, IT management and corporate executives must be ready to respond, minimize and defeat threats to revenue generating and citizen facing operations. In many cases, the decision to protect information assets may materially impact agency or corporate budgets, previously planned investment and projected shareholder returns.
|
530 |
# |
# |
|a Also available in print.
|
538 |
# |
# |
|a Mode of access: World Wide Web.
|
588 |
# |
# |
|a Title from PDF t.p. (viewed on June 26, 2010).
|
650 |
# |
0 |
|a Computer security.
|
710 |
2 |
# |
|a IGI Global.
|
776 |
0 |
# |
|c (Original)
|w (DLC) 2004005871
|z 1591402476
|
830 |
# |
0 |
|a IT solutions series.
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-247-3
|z View fulltext via EzAccess
|