000761433 000__ 01425cam\a2200397Ia\4500 000761433 001__ 761433 000761433 005__ 20230306142156.0 000761433 006__ m\\\\\o\\d\\\\\\\\ 000761433 007__ cr\cn\nnnunnun 000761433 008__ 160924s2016\\\\cau\\\\\o\\\\\001\0\eng\d 000761433 019__ $$a958651004 000761433 020__ $$a9781484221402$$q(electronic book) 000761433 020__ $$a1484221400$$q(electronic book) 000761433 020__ $$z9781484221396 000761433 035__ $$aSP(OCoLC)ocn959149786 000761433 035__ $$aSP(OCoLC)959149786$$z(OCoLC)958651004 000761433 040__ $$aEBLCP$$beng$$cEBLCP$$dN$T$$dGW5XE$$dIDEBK$$dOCLCO$$dN$T$$dOCLCO 000761433 049__ $$aISEA 000761433 050_4 $$aQA76.9.A25 000761433 08204 $$a005.8$$223 000761433 1001_ $$aPompon, Raymond. 000761433 24510 $$aIT security risk control management$$h[electronic resource] :$$ban audit preparation plan /$$cRaymond Pompon. 000761433 260__ $$aBerkeley, CA :$$bApress,$$cc2016. 000761433 300__ $$a1 online resource (328 pages) 000761433 336__ $$atext$$btxt$$2rdacontent 000761433 337__ $$acomputer$$bc$$2rdamedia 000761433 338__ $$aonline resource$$bcr$$2rdacarrier 000761433 500__ $$aIncludes index. 000761433 506__ $$aAccess limited to authorized users. 000761433 588__ $$aOnline resource; title from PDF title page (viewed October 26, 2016) 000761433 650_0 $$aInformation technology$$xSecurity measures$$xManagement. 000761433 650_0 $$aComputer security. 000761433 852__ $$bebk 000761433 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-1-4842-2140-2$$zOnline Access$$91397441.1 000761433 909CO $$ooai:library.usi.edu:761433$$pGLOBAL_SET 000761433 980__ $$aEBOOK 000761433 980__ $$aBIB 000761433 982__ $$aEbook 000761433 983__ $$aOnline 000761433 994__ $$a92$$bISE