IT security metrics
a practical framework for measuring security & protecting data
Gespeichert in:
Verfasser / Beitragende:
Lance Hayden
Ort, Verlag, Jahr:
New York :
McGraw Hill,
2010
Beschreibung:
368 S. : Ill.
Format:
Buch
Online Zugang:
| LEADER | cam a22 4 4500 | ||
|---|---|---|---|
| 001 | 260760552 | ||
| 003 | CHVBK | ||
| 005 | 20201024224212.0 | ||
| 008 | 130816s2010 xxu b||| 001 0 eng| | ||
| 010 | |a 2010020201 | ||
| 015 | |a GBB0-77785 |2 bnb | ||
| 020 | |a 978-0-07-171340-5 (alk. paper) | ||
| 020 | |a 0-07-171340-9 (alk. paper) | ||
| 035 | |a (NEBIS)006154331 | ||
| 035 | |a (RERO)R006337491 | ||
| 035 | |a (OCoLC)606789513 | ||
| 040 | |a DLC |d SzZuIDS NEBIS ETH-BIB | ||
| 050 | |a QA76.9.A25 |b H392 2010 | ||
| 072 | 7 | |a s1in |2 rero | |
| 082 | 0 | |a 005.8 |2 22 | |
| 245 | 0 | 0 | |a IT security metrics |b a practical framework for measuring security & protecting data |c Lance Hayden |
| 260 | |a New York |b McGraw Hill |c 2010 | ||
| 300 | |a 368 S. |b Ill. | ||
| 504 | |a Includes bibliographical references and index | ||
| 650 | 0 | |a Information technology |x Security measures |x Evaluation | |
| 650 | 0 | |a Data protection |x Evaluation | |
| 650 | 0 | |a Computer security |x Evaluation | |
| 650 | 0 | |a Computer crimes |x Prevention |x Measurement | |
| 650 | 7 | |a DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) |x ger |0 (ETHUDK)000034698 |2 ethudk | |
| 650 | 7 | |a FACHLICHE NACHSCHLAGEWERKE + FACHLEXIKA + HANDBÜCHER (DOKUMENTENTYP) |x ger |0 (ETHUDK)000009236 |2 ethudk | |
| 650 | 7 | |a FALLSTUDIEN (DOKUMENTENTYP) |x ger |0 (ETHUDK)000041890 |2 ethudk | |
| 650 | 7 | |a NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME) |x ger |0 (ETHUDK)000051539 |2 ethudk | |
| 650 | 7 | |a SOFTWAREMETRIK (SOFTWARE ENGINEERING) |x ger |0 (ETHUDK)000048853 |2 ethudk | |
| 650 | 7 | |a SYSTEMMANAGEMENT + SYSTEMADMINISTRATION (MANAGEMENT VON COMPUTERSYSTEMEN) |x ger |0 (ETHUDK)000061425 |2 ethudk | |
| 650 | 0 | |a Computer crimes |x Prevention |x Measurement |0 (RERO)B020110555 | |
| 650 | 0 | |a Computer security |x Evaluation |0 (RERO)B020110556 | |
| 650 | 0 | |a Data protection |x Evaluation |0 (RERO)B020110557 | |
| 650 | 0 | |a Information technology |x Security measures |x Evaluation |0 (RERO)B020110558 | |
| 650 | 7 | |a sécurité informatique - mesure |0 (RERO)A020247371 |2 rerovoc | |
| 650 | 7 | |a système informatique - surveillance |0 (RERO)A020247366 |2 rerovoc | |
| 650 | 7 | |a protection des données - évaluation |0 (RERO)B028841055 |2 rerovoc | |
| 650 | 7 | |a Systèmes informatiques |0 (RERO)A021002803 |2 rero | |
| 650 | 7 | |a Mesures de sûreté |0 (RERO)A021017451 |2 rero | |
| 650 | 7 | |a Mesure |0 (RERO)A021004799 |2 rero | |
| 691 | 7 | |B u |a SYSTEMMANAGEMENT + SYSTEMADMINISTRATION (MANAGEMENT VON COMPUTERSYSTEMEN) |z ger |u 004*01*07*04 |2 nebis E1 | |
| 691 | 7 | |B u |a SOFTWAREMETRIK (SOFTWARE ENGINEERING) |z ger |u 004*04*04*09 |2 nebis E1 | |
| 691 | 7 | |B u |a NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME) |z ger |u 004*03*03*04 |2 nebis E1 | |
| 691 | 7 | |B u |a DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) |z ger |u 004*04*06*06 |2 nebis E1 | |
| 691 | 7 | |B u |a FACHLICHE NACHSCHLAGEWERKE + FACHLEXIKA + HANDBÜCHER (DOKUMENTENTYP) |z ger |u (032) |2 nebis E1 | |
| 691 | 7 | |B u |a FALLSTUDIEN (DOKUMENTENTYP) |z ger |u (078.7) |2 nebis E1 | |
| 691 | 7 | |B u |a ADMINISTRATION DE SYSTÈMES INFORMATIQUES (GESTION DE SYSTÈMES INFORMATIQUES) |z fre |u 004*01*07*04 |2 nebis E1 | |
| 691 | 7 | |B u |a SYSTEM MANAGEMENT + SYSTEM ADMINISTRATION (MANAGEMENT OF COMPUTER SYSTEMS) |z eng |u 004*01*07*04 |2 nebis E1 | |
| 691 | 7 | |B u |a MÉTROLOGIE DU LOGICIEL (GÉNIE LOGICIEL) |z fre |u 004*04*04*09 |2 nebis E1 | |
| 691 | 7 | |B u |a SOFTWARE METRICS (SOFTWARE ENGINEERING) |z eng |u 004*04*04*09 |2 nebis E1 | |
| 691 | 7 | |B u |a NETWORK MONITORING (COMPUTER SYSTEMS) |z eng |u 004*03*03*04 |2 nebis E1 | |
| 691 | 7 | |B u |a SURVEILLANCE DE RÉSEAUX (SYSTÈMES INFORMATIQUES) |z fre |u 004*03*03*04 |2 nebis E1 | |
| 691 | 7 | |B u |a SÉCURITÉ ET PROTECTION DES DONNÉES (SYSTÈMES D'EXPLOITATION) |z fre |u 004*04*06*06 |2 nebis E1 | |
| 691 | 7 | |B u |a DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS) |z eng |u 004*04*06*06 |2 nebis E1 | |
| 691 | 7 | |B u |a OUVRAGES DE RÉFÉRENCE SPÉCIALISÉS + ENCYCLOPÉDIES SPÉCIALISÉES + MANUELS (TYPE DE DOCUMENT) |z fre |u (032) |2 nebis E1 | |
| 691 | 7 | |B u |a SPECIALIZED REFERENCE WORKS + SPECIALIZED ENCYCLOPAEDIAS + HANDBOOKS (DOCUMENT TYPE) |z eng |u (032) |2 nebis E1 | |
| 691 | 7 | |B u |a CASE STUDIES (DOCUMENT TYPE) |z eng |u (078.7) |2 nebis E1 | |
| 691 | 7 | |B u |a ÉTUDES DE CAS (TYPE DE DOCUMENT) |z fre |u (078.7) |2 nebis E1 | |
| 700 | 1 | |a Hayden |D Lance | |
| 898 | |a BK020000 |b XK020000 |c XK020000 | ||
| 900 | 7 | |a Metadata rights reserved |2 rero | |
| 912 | 7 | |a 091 |2 E01-20101101 | |
| 912 | 7 | |a 095 |2 E01-20101101 | |
| 949 | |B RERO |F RE01046 |b RE01046 |c RE010460003 |j DIUF 1.6.1 |s TIB 8959 | ||
| 949 | |B NEBIS |F E01 |b E01 |c MG |j T 33391 | ||
| 950 | |B NEBIS |P 700 |E 1- |a Hayden |D Lance | ||
| 950 | |B RERO |P 100 |E 1- |a Hayden |D Lance |0 (RERO)A020233853 |4 cre | ||
| 956 | 4 | |B NEBIS |C EAD50 |D EBI01 |a E01 |u https://opac.nebis.ch/objects/pdf/e01_978-0-07-171340-5_01.pdf |y Titelblatt und Inhaltsverzeichnis |x VIEW |q pdf | |
| 956 | 4 | |B NEBIS |C EAD50 |D EBI01 |a E01 |u https://opac.nebis.ch/objects/pdf/e01_978-0-07-171340-5_02.pdf |y Abstract / Autoreninformation |x VIEW |q pdf | |
| 986 | |a SWISSBIB |b 260760552 | ||