000911714 000__ 01567cam\a2200409\i\4500 000911714 001__ 911714 000911714 005__ 20210515183455.0 000911714 006__ m\\\\\o\\d\\\\\\\\ 000911714 007__ cr\cn\nnnunnun 000911714 008__ 140227t20112011sz\a\\\\ob\\\\000\0\eng\d 000911714 020__ $$z9781439879153 000911714 020__ $$a9781439879160 $$q(electronic book) 000911714 035__ $$a(MiAaPQ)EBC1605622 000911714 035__ $$a(Au-PeEL)EBL1605622 000911714 035__ $$a(CaPaEBR)ebr10839552 000911714 035__ $$a(CaONFJC)MIL581452 000911714 035__ $$a(OCoLC)874163089 000911714 040__ $$aMiAaPQ$$beng$$erda$$epn$$cMiAaPQ$$dMiAaPQ 000911714 050_4 $$aQA76.9.A25$$bT37 2011 000911714 1001_ $$aTashi, Igli. 000911714 24510 $$aInformation security evaluation :$$ba holistic approach /$$cIgli Tashi and Solange Ghernaouti-Hélie. 000911714 264_1 $$aLausanne, Switzerland :$$bEPFL,$$c[2011] 000911714 264_4 $$c©2011 000911714 300__ $$a1 online resource (212 pages) :$$billustrations. 000911714 336__ $$atext$$2rdacontent 000911714 337__ $$acomputer$$2rdamedia 000911714 338__ $$aonline resource$$2rdacarrier 000911714 440_0 $$aManagement of technology series 000911714 504__ $$aIncludes bibliographical references. 000911714 506__ $$aAccess limited to authorized users. 000911714 588__ $$aDescription based on online resource; title from PDF title page (viewed March 7, 2014). 000911714 650_0 $$aBusiness intelligence. 000911714 650_0 $$aConfidential business information. 000911714 7001_ $$aGhernaouti-Hélie, Solange. 000911714 852__ $$bebk 000911714 85640 $$3ProQuest Ebook Central Academic Complete$$uhttps://univsouthin.idm.oclc.org/login?url=https://ebookcentral.proquest.com/lib/usiricelib-ebooks/detail.action?docID=1605622$$zOnline Access 000911714 909CO $$ooai:library.usi.edu:911714$$pGLOBAL_SET 000911714 980__ $$aEBOOK 000911714 980__ $$aBIB 000911714 982__ $$aEbook 000911714 983__ $$aOnline