000425072 000__ 01497nam\a2200433Ia\4500 000425072 001__ 425072 000425072 003__ MiAaPQ 000425072 005__ 20211102003728.0 000425072 006__ m\\\\\o\\d\\\\\\\\ 000425072 007__ cr\cn\nnnunnun 000425072 008__ 071102s2008\\\\njua\\\\ob\\\\001\0\eng\d 000425072 010__ $$z 2007045580 000425072 020__ $$z0470145013 (cloth) 000425072 020__ $$z9780470145012 (cloth) 000425072 035__ $$a(MiAaPQ)EBC335724 000425072 035__ $$a(Au-PeEL)EBL335724 000425072 035__ $$a(CaPaEBR)ebr10296785 000425072 035__ $$a(CaONFJC)MIL128459 000425072 035__ $$a(OCoLC)437204777 000425072 040__ $$aMiAaPQ$$cMiAaPQ$$dMiAaPQ 000425072 050_4 $$aHD30.2$$b.D456 2008 000425072 1001_ $$aDeLuccia, James J.,$$d1977- 000425072 24510 $$aIT compliance and controls:$$bbest practices for implementation /$$cJames J. DeLuccia IV. 000425072 260__ $$aHoboken, N.J. :$$bJohn Wiley & Sons,$$cc2008. 000425072 300__ $$axiv, 274 p. :$$bill. 000425072 336__ $$atext$$2rdacontent 000425072 337__ $$acomputer$$2rdamedia 000425072 338__ $$aonline resource$$2rdacarrier 000425072 504__ $$aIncludes bibliographical references and index. 000425072 506__ $$aAccess limited to authorized users. 000425072 650_0 $$aComputer networks$$xSecurity measures. 000425072 650_0 $$aComputer networks$$xStandards. 000425072 650_0 $$aInformation technology$$xManagement. 000425072 655_0 $$aElectronic books 000425072 852__ $$bebk 000425072 85640 $$3ProQuest Ebook Central Academic Complete $$uhttps://univsouthin.idm.oclc.org/login?url=https://ebookcentral.proquest.com/lib/usiricelib-ebooks/detail.action?docID=335724$$zOnline Access 000425072 909CO $$ooai:library.usi.edu:425072$$pGLOBAL_SET 000425072 980__ $$aBIB 000425072 980__ $$aEBOOK 000425072 982__ $$aEbook 000425072 983__ $$aOnline