LEADER 02949nam 2200601Ia 450 001 9910451215703321 005 20200520144314.0 010 $a1-281-14365-0 010 $a9786611143657 010 $a1-84663-697-3 035 $a(CKB)1000000000405450 035 $a(EBL)328737 035 $a(OCoLC)437197058 035 $a(SSID)ssj0000830289 035 $a(PQKBManifestationID)11463767 035 $a(PQKBTitleCode)TC0000830289 035 $a(PQKBWorkID)10799238 035 $a(PQKB)11213238 035 $a(MiAaPQ)EBC328737 035 $a(Au-PeEL)EBL328737 035 $a(CaPaEBR)ebr10211641 035 $a(EXLCZ)991000000000405450 100 $a19930922d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aInformation management & computer security$hVolume 15, Number 5$iPapers from the HAISA 2007 Symposium$b[electronic resource] 210 $a[Bradford, England] $cEmerald$d2007 215 $a1 online resource (100 p.) 225 1 $aInformation Management and Computer Security - Volume 15, Issue 5 300 $aDescription based upon print version of record. 311 $a1-84663-696-5 320 $aIncludes bibliographical references. 327 $aCover; CONTENTS; EDITORIAL ADVISORY BOARD; Guest editorial; Comply! Resistance is futile; Vendor availability: a key factor for outsourcing in Chilean ICT sector; How well are information risks being communicated to your computer end-users?; User-centred security applied to the development of a management information system; Improving protection mechanisms by understanding online risk; Usable set-up of runtime security policies; Toward viable information security reporting systems; On the imbalance of the security problem space and its expected consequences 330 $aThe first two papers in this e-book give a global perspective on Information Management issues. The remaining papers are security-focused, and have been selected for inclusion from the International Symposium on Human Aspects of Information Security & Assurance (HAISA 2007), which took place in Plymouth, UK, on 10 July 2007. The theme of the event reflected that a significant aspect of protection comes down to the attitudes, awareness, behaviour and capabilities of the people involved. 410 0$aInformation Management and Computer Security - Volume 15, Issue 5 606 $aComputer security 606 $aInformation technology$xManagement 606 $aManagement information systems 608 $aElectronic books. 615 0$aComputer security. 615 0$aInformation technology$xManagement. 615 0$aManagement information systems. 676 $a658.4/038 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910451215703321 996 $aInformation management & computer security$91759866 997 $aUNINA LEADER 01207nam a22003255i 4500 001 991002259659707536 007 cr nn 008mamaa 008 110704s2011 de | s |||| 0|eng d 020 $a9783642212161 035 $ab14146277-39ule_inst 040 $aBibl. Dip.le Aggr. Matematica e Fisica - Sez. Matematica$beng 082 04$a519.2$223 084 $aAMS 60J27 084 $aAMS 60J45 084 $aAMS 60K35 100 1 $aLe Jan, Yves$062931 245 10$aMarkov paths, loops and fields$h[e-book] :$bécole d'été de probabilités de Saint-Flour, 2008 /$cby Yves Le Jan 260 $aBerlin :$bSpringer,$c2011 300 $a1 online resource (viii, 124 p.) 440 0$aLecture Notes in Mathematics,$x0075-8434 ;$v2026 650 0$aMathematics 650 0$aPotential theory (Mathematics) 650 0$aDistribution (Probability theory) 773 0 $aSpringer eBooks 856 40$uhttp://dx.doi.org/10.1007/978-3-642-21216-1$zAn electronic book accessible through the World Wide Web 907 $a.b14146277$b03-03-22$c05-09-13 912 $a991002259659707536 996 $aMarkov paths, loops and fields$9261820 997 $aUNISALENTO 998 $ale013$b05-09-13$cm$d@ $e-$feng$gde $h0$i0