001376433 000__ 01806nam\a2200445\i\4500 001376433 001__ 1376433 001376433 003__ MiAaPQ 001376433 005__ 20210930003127.0 001376433 006__ m\\\\\o\\d\\\\\\\\ 001376433 007__ cr\cn\nnnunnun 001376433 008__ 201008s2020\\\\enk\\\\\o\\\\\000\0\eng\d 001376433 020__ $$z9781839099311 001376433 020__ $$a9781839099304 $$q(electronic book) 001376433 035__ $$a(MiAaPQ)EBC6232221 001376433 035__ $$a(Au-PeEL)EBL6232221 001376433 035__ $$a(OCoLC)1163475139 001376433 040__ $$aMiAaPQ$$beng$$erda$$epn$$cMiAaPQ$$dMiAaPQ 001376433 050_4 $$aTK5105.59$$b.M675 2020 001376433 0820_ $$a004.6$$223 001376433 1001_ $$aMoriarty, Kathleen M.,$$eauthor. 001376433 24510 $$aTransforming information security :$$boptimizing five concurrent trends to reduce resource drain /$$cKathleen M. Moriarty. 001376433 250__ $$aFirst edition. 001376433 264_1 $$aBingley, UK :$$bEmerald Publishing Limited,$$c[2020] 001376433 264_4 $$c©2020 001376433 300__ $$a1 online resource (241 pages) 001376433 336__ $$atext$$btxt$$2rdacontent 001376433 337__ $$acomputer$$bc$$2rdamedia 001376433 338__ $$aonline resource$$bcr$$2rdacarrier 001376433 506__ $$aAccess limited to authorized users. 001376433 588__ $$aDescription based on print version record. 001376433 650_0 $$aInformation networks$$xSecurity measures. 001376433 650_0 $$aInformation technology$$xManagement. 001376433 650_0 $$aInformation resources management. 001376433 655_0 $$aElectronic books 001376433 77608 $$iPrint version:$$aMoriarty, Kathleen M.$$tTransforming information security : optimizing five concurrent trends to reduce resource drain.$$bFirst edition.$$dBingley, UK : Emerald Publishing Limited, c2020 $$z9781839099311 001376433 852__ $$bebk 001376433 85640 $$3ProQuest Ebook Central Academic Complete $$uhttps://univsouthin.idm.oclc.org/login?url=https://ebookcentral.proquest.com/lib/usiricelib-ebooks/detail.action?docID=6232221$$zOnline Access 001376433 909CO $$ooai:library.usi.edu:1376433$$pGLOBAL_SET 001376433 980__ $$aBIB 001376433 980__ $$aEBOOK 001376433 982__ $$aEbook 001376433 983__ $$aOnline