000 | 01405cam a2200325 a 4500 | ||
---|---|---|---|
999 |
_c2394 _d2394 |
||
001 | 3031883 | ||
003 | ZET-ke | ||
005 | 20220219020010.0 | ||
008 | 950515s1996 maua b 001 0 eng | ||
010 | _a 95004797 | ||
020 | _a0750696001 (hardcover) | ||
040 |
_aDLC _cZET-ke _dDLC |
||
050 | 0 | 0 |
_aHF5548.37 _b.C37 1996 |
082 | 0 | 0 |
_a658.4/78 _220 |
100 | 1 |
_aCarroll, John M. _q(John Millar), _d1950- |
|
245 | 1 | 0 |
_aComputer security / _cJohn M. Carroll. |
250 | _a3rd ed. | ||
260 |
_aBoston, Mass. : _bButterworth-Heinemann, _cc1996. |
||
300 |
_axviii, 648 p. : _bill. ; _c24 cm. |
||
504 | _aIncludes bibliographical references (p. 629-633) and index. | ||
505 | _aThe threat to computer security -- Security management considerations -- Physical security -- Communications security -- Systems security -- Information security risk analysis. | ||
650 | 0 |
_aElectronic data processing departments _xSecurity measures. |
|
650 | 0 |
_aComputer security. _91473 |
|
650 | 0 | _aComputer crimes. | |
856 | 4 | 2 |
_3Publisher description _uhttp://www.loc.gov/catdir/description/els032/95004797.html |
856 | 4 | 1 |
_3Table of contents _uhttp://www.loc.gov/catdir/toc/els032/95004797.html |
906 |
_a7 _bcbc _corignew _d1 _eocip _f19 _gy-gencatlg |
||
942 |
_2lcc _cBK _kHF5548.37 _m.C37 1996 _01 |