000104800 000__ 00922pam\a2200301W1\4500 000104800 001__ 104800 000104800 005__ 20210513040043.0 000104800 008__ 840822s1985\\\\maua\\\\\\\\\\00110\eng\\ 000104800 010__ $$a84-019899 000104800 020__ $$a0409951358 000104800 035__ $$a(OCoLC)ocm11133257 000104800 035__ $$a00276517 000104800 035__ $$9AAL7645SI 000104800 035__ $$a104800 000104800 0390_ $$a2$$b3$$c3$$d3$$e3 000104800 040__ $$aDLC$$cDLC$$dISE 000104800 049__ $$aISEA 000104800 0500_ $$aHF5548.37$$b.P47 1985 000104800 0820_ $$a658.4/78$$219 000104800 099__ $$aHF5548.37 .P47 1985 000104800 1001_ $$aPerry, William E. 000104800 24510 $$aManagement strategies for computer security /$$cWilliam E. Perry. 000104800 260__ $$aBoston :$$bButterworth Publishers,$$cc1985. 000104800 300__ $$axi, 193 p. :$$bill. ;$$c25 cm. 000104800 500__ $$aIncludes index. 000104800 650_0 $$aElectronic data processing departments$$xSecurity measures. 000104800 650_0 $$aComputers$$xAccess control. 000104800 85200 $$bgen$$hHF5548.37 .P47 1985 000104800 909CO $$ooai:library.usi.edu:104800$$pGLOBAL_SET 000104800 966__ $$c 1$$lUSIGEN$$mBKGEN$$sHF5548.37 .P47 1985$$xISEA$$z050$$b39203008820255 000104800 980__ $$aBIB 000104800 980__ $$aBOOK