000417894 000__ 01730nam\a2200469Ia\4500 000417894 001__ 417894 000417894 003__ MiAaPQ 000417894 005__ 20211102003648.0 000417894 006__ m\\\\\o\\d\\\\\\\\ 000417894 007__ cr\cn\nnnunnun 000417894 008__ 081020s2009\\\\nju\\\\\ob\\\\001\0\eng\d 000417894 010__ $$z 2008043719 000417894 020__ $$z9780470721995 (pbk. : alk. paper) 000417894 035__ $$a(MiAaPQ)EBC437522 000417894 035__ $$a(Au-PeEL)EBL437522 000417894 035__ $$a(CaPaEBR)ebr10300879 000417894 035__ $$a(CaONFJC)MIL202245 000417894 035__ $$a(OCoLC)367588970 000417894 040__ $$aMiAaPQ$$cMiAaPQ$$dMiAaPQ 000417894 050_4 $$aHF5548.37$$b.L33 2009 000417894 08204 $$a658.4/78$$222 000417894 1001_ $$aLacey, David. 000417894 24510 $$aManaging the human factor in information security:$$bhow to win over staff and influence business managers /$$cDavid Lacey. 000417894 260__ $$aChichester, West Sussex, England ;$$aHoboken, NJ :$$bWiley,$$cc2009. 000417894 300__ $$axxiv, 374 p. 000417894 336__ $$atext$$2rdacontent 000417894 337__ $$acomputer$$2rdamedia 000417894 338__ $$aonline resource$$2rdacarrier 000417894 504__ $$aIncludes bibliographical references and index. 000417894 506__ $$aAccess limited to authorized users. 000417894 650_0 $$aComputer crimes$$xPrevention. 000417894 650_0 $$aElectronic data processing departments$$xSecurity measures. 000417894 650_0 $$aIndustries$$xSecurity measures. 000417894 650_0 $$aInformation technology$$xSecurity measures. 000417894 650_0 $$aManagement information systems$$xHuman factors. 000417894 650_0 $$aManagement$$xEmployee participation. 000417894 655_0 $$aElectronic books 000417894 852__ $$bebk 000417894 85640 $$3ProQuest Ebook Central Academic Complete $$uhttps://univsouthin.idm.oclc.org/login?url=https://ebookcentral.proquest.com/lib/usiricelib-ebooks/detail.action?docID=437522$$zOnline Access 000417894 909CO $$ooai:library.usi.edu:417894$$pGLOBAL_SET 000417894 980__ $$aBIB 000417894 980__ $$aEBOOK 000417894 982__ $$aEbook 000417894 983__ $$aOnline