LEADER 02409nam 2200625 a 450 001 9910777038303321 005 20230721031312.0 010 $a1-281-30177-9 010 $a9786611301774 010 $a0-313-34559-7 035 $a(CKB)1000000000412981 035 $a(EBL)339307 035 $a(OCoLC)218464465 035 $a(SSID)ssj0000299653 035 $a(PQKBManifestationID)11229250 035 $a(PQKBTitleCode)TC0000299653 035 $a(PQKBWorkID)10242791 035 $a(PQKB)10335348 035 $a(MiAaPQ)EBC339307 035 $a(Au-PeEL)EBL339307 035 $a(CaPaEBR)ebr10481060 035 $a(CaONFJC)MIL130177 035 $a(EXLCZ)991000000000412981 100 $a20071025d2008 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aInformation security$b[electronic resource] $ea manager's guide to thwarting data thieves and hackers /$fPhilip Alexander 210 $aWestport, Conn. $cPraeger Security International$d2008 215 $a1 online resource (187 p.) 225 1 $aPSI business security 300 $aIncludes index. 311 $a0-313-34558-9 327 $aComputer use and data security policies and standards -- Network/DMZ design -- Defense in depth -- Authentication and authorization -- Security and the mobile employee -- Business continuity planning -- Hackers, snoops, and viruses -- Personnel issues and hiring practices -- Contractual considerations -- Data privacy laws -- Overseas outsourcing. 330 $aAn IT security expert arms managers and security professionals with the knowledge they need to protect computers, networks, Web sites, and other company assets. 410 0$aPSI business security. 606 $aBusiness enterprises$xComputer networks$xSecurity measures 606 $aInformation technology$xSecurity measures 606 $aComputer security 606 $aData protection 615 0$aBusiness enterprises$xComputer networks$xSecurity measures. 615 0$aInformation technology$xSecurity measures. 615 0$aComputer security. 615 0$aData protection. 676 $a005.8 700 $aAlexander$b Philip$f1963-$01554717 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910777038303321 996 $aInformation security$93816135 997 $aUNINA