000909912 000__ 01724nam\a2200469\a\4500 000909912 001__ 909912 000909912 003__ MiAaPQ 000909912 005__ 20211103003932.0 000909912 006__ m\\\\\o\\d\\\\\\\\ 000909912 007__ cr\cn\nnnunnun 000909912 008__ 130417s2013\\\\flua\\\\ob\\\\000\0\eng\d 000909912 020__ $$z9781439881521 000909912 020__ $$a9781439881538 (electronic bk.) 000909912 035__ $$a(MiAaPQ)EBC1153198 000909912 035__ $$a(Au-PeEL)EBL1153198 000909912 035__ $$a(CaPaEBR)ebr10674495 000909912 035__ $$a(CaONFJC)MIL502173 000909912 035__ $$a(OCoLC)831118565 000909912 040__ $$aMiAaPQ$$cMiAaPQ$$dMiAaPQ 000909912 050_4 $$aHD30.38$$b.B768 000909912 08204 $$a658.478$$223 000909912 1001_ $$aBrotby, W. Krag. 000909912 24510 $$aPragmatic security metrics$$h[electronic resource]$$bapplying metametrics to information security /$$cW. Krag Brotby and Gary Hinson ; preface by M. E. Kabay. 000909912 260__ $$aBoca Raton, Fla. :$$bCRC Press,$$cc2013. 000909912 300__ $$a1 online resource (xviii, 485 p.) :$$bill. 000909912 336__ $$atext$$2rdacontent 000909912 337__ $$acomputer$$2rdamedia 000909912 338__ $$aonline resource$$2rdacarrier 000909912 504__ $$aIncludes bibliographical references. 000909912 506__ $$aAccess limited to authorized users. 000909912 588__ $$aDescription based on online resource; title from title page (ebrary, viewed April 17, 2013). 000909912 650_0 $$aBusiness enterprises$$xComputer networks$$xSecurity measures. 000909912 650_0 $$aComputer security. 000909912 650_0 $$aData protection. 000909912 655_0 $$aElectronic books 000909912 7001_ $$aHinson, Gary. 000909912 7001_ $$aKabay, M. E. 000909912 852__ $$bebk 000909912 85640 $$3ProQuest Ebook Central Academic Complete $$uhttps://univsouthin.idm.oclc.org/login?url=https://ebookcentral.proquest.com/lib/usiricelib-ebooks/detail.action?docID=1153198$$zOnline Access 000909912 909CO $$ooai:library.usi.edu:909912$$pGLOBAL_SET 000909912 980__ $$aBIB 000909912 980__ $$aEBOOK 000909912 982__ $$aEbook 000909912 983__ $$aOnline