LEADER 00769nam0 2200265 450 001 9910646377703321 005 20230227103754.0 010 $a9781307611533 100 $a20230227d2020----km y0itay50 ba 101 0 $aeng 102 $aGB 105 $ay 001yy 200 1 $aCorporate Finance & Financial Institutions$fElisa Cavezzali, Ugo Rigoni 210 $aUK$cMc Graw Hill create$d2020 215 $aVII, 326 p.$d20 cm 676 $a346.730666$v23$zita 700 1$aCavezzali,$bElisa$01278908 701 1$aRigoni,$bUgo$0595694 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a9910646377703321 952 $aVIII H 947$b2021/53$fFGBC 959 $aFGBC 996 $aCorporate Finance & Financial Institutions$93014086 997 $aUNINA LEADER 01343nam 2200373Ka 450 001 9910696504903321 005 20080520110159.0 035 $a(CKB)5470000002379807 035 $a(OCoLC)228411607 035 $a(EXLCZ)995470000002379807 100 $a20080520d2000 ua 0 101 0 $aeng 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aLake Tahoe Watershed assessment$b[electronic resource] /$fDennis D. Murphy and Christopher M. Knopp, editors 210 1$aBerkeley, CA :$cPacific Southwest Research Station, USDA Forest Service,$d[2000] 215 $a2 volumes $cdigital, PDF files 225 1 $aGeneral technical report PSW ;$vGTR-175-176 300 $aTitle from title screen (viewed May 19, 2008) 300 $a"March 2000." 327 $av. 1. [Untitled] -- v. 2. Appendixes. 606 $aWatershed ecology$zTahoe, Lake, Watershed (Calif. and Nev.) 607 $aTahoe, Lake, Watershed (Calif. and Nev.)$xEnvironmental conditions 615 0$aWatershed ecology 701 $aMurphy$b Dennis D$01420740 701 $aKnopp$b Christopher M$01420741 712 02$aPacific Southwest Research Station. 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910696504903321 996 $aLake Tahoe Watershed assessment$93539674 997 $aUNINA LEADER 01927nam 2200445 450 001 9910787860203321 005 20230803195624.0 010 $a1-118-85179-X 035 $a(CKB)2670000000547027 035 $a(EBL)1652940 035 $a(MiAaPQ)EBC1652940 035 $a(EXLCZ)992670000000547027 100 $a20140402h20142014 uy 0 101 0 $aeng 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 00$aComputer security handbook /$fedited by Seymour Bosworth, Michel E. Kabay, Eric Whyne 205 $a6th edition. 210 1$aHoboken, New Jersey :$cWiley,$d2014. 210 4$dİ2014 215 $a1 online resource (2207 p.) 300 $aDescription based upon print version of record. 311 $a1-118-12706-4 320 $aIncludes bibliographical references and index. 330 $aComputer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written for professionals and college students, it provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more. This essential and highly-regarded 606 $aElectronic data processing departments$xSecurity measures 615 0$aElectronic data processing departments$xSecurity measures. 676 $a658.4 676 $a658.478 702 $aBosworth$b Seymour 702 $aKabay$b Michel E. 702 $aWhyne$b Eric$f1981- 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910787860203321 996 $aComputer security handbook$92066238 997 $aUNINA