Building an effective information security policy architecture
Saved in:
Main Author: | |
---|---|
Format: | Book |
Published: |
Boca Raton
CRC Press
2008
|
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000n a2200000 a 4501 | ||
---|---|---|---|
001 | wils-423704 | ||
020 | # | # | |a 9781420059052 (alk. paper) |
020 | # | # | |a 142005905X (alk. paper) |
040 | # | # | |a DLC |d ITMB |
090 | 0 | 0 | |a QA76.9.A25 |b B335 2008 |
100 | 1 | # | |a Bacik, Sandy |
245 | 1 | 0 | |a Building an effective information security policy architecture |c Sandy Bacik |
260 | # | # | |a Boca Raton |b CRC Press |c 2008 |
300 | # | # | |a xiv, 344 p. |b ill. |c 25 cm |
504 | # | # | |a Includes bibliographical references and index |
650 | # | 0 | |a Computer security |
650 | # | 0 | |a Computer networks |x Security measures |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=423704 |
964 | # | # | |c BOK |d AG |