|
|
|
|
LEADER |
02409nam a2200493 a 4500 |
001 |
29721 |
003 |
IGIG |
005 |
20100720215326.0 |
006 |
m e d |
007 |
cr bn||||m|||a |
008 |
100704s2005 paua fsb 001 0 eng d |
010 |
# |
# |
|z 2004023593
|
020 |
# |
# |
|a 9781591405504 (ebook)
|
020 |
# |
# |
|a 1591405505 (ebook)
|
020 |
# |
# |
|z 1591405831 (hc)
|
020 |
# |
# |
|z 9781591405832 (hc)
|
020 |
# |
# |
|z 9781591405498 (sc)
|
020 |
# |
# |
|z 1591405491 (sc)
|
024 |
7 |
# |
|a 10.4018/978-1-59140-583-2
|2 doi
|
035 |
# |
# |
|a (CaBNVSL)gtp00542109
|
035 |
# |
# |
|a (OCoLC)707611666
|
040 |
# |
# |
|a CaBNVSL
|c CaBNVSL
|d CaBNVSL
|
050 |
# |
4 |
|a HV6773
|b .J354 2005e
|
082 |
0 |
4 |
|a 658.4/78
|2 22
|
100 |
1 |
# |
|a Janczewski, Lech,
|d 1943-
|
245 |
1 |
0 |
|a Managerial guide for handling cyber-terrorism and information warfare
|c Lech J. Janczewski and Andrew M. Colarik.
|h [electronic resource] /
|
260 |
# |
# |
|a Hershey, Pa. :
|b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
|c c2005.
|
300 |
# |
# |
|a electronic texts (xiv, 229 p. : ill.) :
|b digital files.
|
504 |
# |
# |
|a Includes bibliographical references and index.
|
505 |
0 |
# |
|a Information and Computer Security -- The Nature of Terrorism -- Cyber-Terrorism -- Physical Security -- Denial of Service Threat -- Web Defacements and Semantic Attacks -- DNS Attacks -- Routing Vulnerabilities -- Identity Stealing Attacks -- Identification, Authentication, and Access Control -- Personnel Security -- Operations Management -- Information Security Policy -- Business Continuity Management.
|
506 |
1 |
# |
|a Restricted to subscribers or individual electronic text purchasers.
|
520 |
3 |
# |
|a This book defines the organizational security measures that will decrease an organization's information system vulnerabilities to all types of attacks.
|
530 |
# |
# |
|a Also available in print.
|
538 |
# |
# |
|a Mode of access: World Wide Web.
|
588 |
# |
# |
|a Title from PDF t.p. (viewed on July 4, 2010).
|
650 |
# |
0 |
|a Cyberterrorism.
|
650 |
# |
0 |
|a Computer crimes.
|
650 |
# |
0 |
|a Information warfare.
|
650 |
# |
0 |
|a Information technology
|x Management.
|
700 |
1 |
# |
|a Colarik, Andrew M.
|
710 |
2 |
# |
|a IGI Global.
|
776 |
0 |
# |
|c (Original)
|w (DLC) 2004023593
|z 1591405831
|z 9781591405832
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-583-2
|z View fulltext via EzAccess
|