Computer security risk management
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Book |
Published: |
London
Jesssica Kingsley
1989
|
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000n a2200000 a 4501 | ||
---|---|---|---|
001 | wils-32622 | ||
020 | # | # | |a 1853020591 |
090 | 0 | 0 | |a QA76.9.A25 |b P35 1989 |
100 | 1 | # | |a Palmer, Ian C |
245 | 1 | 1 | |a Computer security risk management |c I.C. Palmer, G.A. Potter |
260 | # | # | |a London |b Jesssica Kingsley |c 1989 |
300 | # | # | |a 317 p. |b ill. |c 31 cm |
500 | # | # | |a Includes index. |
650 | # | 0 | |a Computer security |
650 | # | 0 | |a Risk management |
700 | 1 | # | |a Potter, G. A |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=32622 |
964 | # | # | |c BOK |d 01 |
040 | # | # | |a Shah Alam |
998 | # | # | |a 00260##a002.8.2||00260##b002.8.4||00260##c002.7.6||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00500##a002.17.2|| |