000413771 000__ 01704nam\a2200469Ia\4500 000413771 001__ 413771 000413771 003__ MiAaPQ 000413771 005__ 20211102003636.0 000413771 006__ m\\\\\o\\d\\\\\\\\ 000413771 007__ cr\cn\nnnunnun 000413771 008__ 090127s2009\\\\maua\\\\ob\\\\001\0\eng\d 000413771 020__ $$z1596931906 000413771 020__ $$z9781596931909 000413771 035__ $$a(MiAaPQ)EBC456886 000413771 035__ $$a(Au-PeEL)EBL456886 000413771 035__ $$a(CaPaEBR)ebr10312928 000413771 035__ $$a(OCoLC)434595684 000413771 040__ $$aMiAaPQ$$cMiAaPQ$$dMiAaPQ 000413771 050_4 $$aHF5548.37$$b.E58 2009 000413771 24500 $$aEnterprise information security and privacy/$$cC. Warren Axelrod, Jennifer L. Bayuk, Daniel Schutzer, editors. 000413771 260__ $$aNorwood, MA ;$$aLondon :$$bArtech House,$$cc2009. 000413771 300__ $$axxiv, 231 p. :$$bill. 000413771 336__ $$atext$$2rdacontent 000413771 337__ $$acomputer$$2rdamedia 000413771 338__ $$aonline resource$$2rdacarrier 000413771 4901_ $$aArtech House information security and privacy series 000413771 504__ $$aIncludes bibliographical references and index. 000413771 506__ $$aAccess limited to authorized users. 000413771 650_0 $$aBusiness enterprises$$xComputer networks$$xSecurity measures. 000413771 650_0 $$aComputer security. 000413771 650_0 $$aData protection. 000413771 650_0 $$aInformation technology$$xSecurity measures. 000413771 655_0 $$aElectronic books 000413771 7001_ $$aAxelrod, C. Warren. 000413771 7001_ $$aBayuk, Jennifer L. 000413771 7001_ $$aSchutzer, Daniel,$$d1940- 000413771 830_0 $$aArtech House information security and privacy series. 000413771 852__ $$bebk 000413771 85640 $$3ProQuest Ebook Central Academic Complete $$uhttps://univsouthin.idm.oclc.org/login?url=https://ebookcentral.proquest.com/lib/usiricelib-ebooks/detail.action?docID=456886$$zOnline Access 000413771 909CO $$ooai:library.usi.edu:413771$$pGLOBAL_SET 000413771 980__ $$aBIB 000413771 980__ $$aEBOOK 000413771 982__ $$aEbook 000413771 983__ $$aOnline