Computer Security 20 Things Every Employee Should Know
Securing corporate resources and data in the workplace is everyone's responsibility. Corporate IT security strategies are only as good as the employee's awareness of his or her role in maintaining that strategy. This book presents the risks, responsibilities, and liabilities (known and unk...
Saved in:
Main Author: | |
---|---|
Format: | Book |
Language: | English |
Published: |
New York
McGraw-Hill
2005
|
Edition: | Second Edition |
Series: | McGraw-Hill Professional Education
|
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000caa#a2200000#i 4501 | ||
---|---|---|---|
001 | wils-340875 | ||
005 | 2023049929 | ||
008 | t2005 NYU ### ##000 ##eng#D | ||
020 | # | # | |a 0072262826 (paperback) |
020 | # | # | |a 9780072262827 (paperback) |
040 | # | # | |a GSA |d ITMB |e RDA |
041 | 0 | # | |a eng |
090 | 0 | 0 | |a HF5548.37 |b .R67 2005 |
100 | 1 | # | |a Rothke, Ben |e author |
245 | 1 | 0 | |a Computer Security |b 20 Things Every Employee Should Know |c Ben Rothke |
250 | # | # | |a Second Edition |
264 | # | 1 | |a New York |b McGraw-Hill |c 2005 |
264 | # | 4 | |c ©2005 |
300 | # | # | |a ix, 48 pages |b colour |c 23 cm |
336 | # | # | |a text |2 rdacontent |
337 | # | # | |a unmediated |2 rdamedia |
338 | # | # | |a volume |2 rdacarrier |
490 | 1 | # | |a McGraw-Hill Professional Education |
500 | # | # | |a "The employee handbook for securing the workplace"--Cover |
504 | # | # | |a Includes bibliographical references and index |
520 | # | # | |a Securing corporate resources and data in the workplace is everyone's responsibility. Corporate IT security strategies are only as good as the employee's awareness of his or her role in maintaining that strategy. This book presents the risks, responsibilities, and liabilities (known and unknown) of which every employee should be aware, as well as simple protective steps to keep corporate data and systems secure. Inside this easy-to-follow guide, you'll find 20 lessons you can use to ensure that you are doing your part to protect corporate systems and privileged data. The topics covered include: |
546 | # | # | |a english |
650 | # | 0 | |a Computer security |v Handbooks, manuals, etc. |
650 | # | 0 | |a Data protection |v Handbooks, manuals, etc. |
830 | # | 0 | |a McGraw-Hill Professional Education |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=340875 |
964 | # | # | |c BOK |d 01 |
998 | # | # | |a 00250##a002.17.2||00250##b002.5.3||00264#1a002.8.2||00264#1b002.8.4||00300##a002.17.2||00300##b003.6.1||00300##c002.17.2||00500##a002.17.2||00520##a007.2||00520##b007.2||00546##a006.11|| |