000941648 000__ 01448cam\a2200385\i\4500 000941648 001__ 941648 000941648 005__ 20210515195559.0 000941648 006__ m\\\\\o\\d\\\\\\\\ 000941648 007__ cr\cn\nnnunnun 000941648 008__ 131102s2013\\\\enk\\\\\o\\\\\000\0\eng\d 000941648 020__ $$z9781849285223 000941648 020__ $$a9781849285230 $$q(electronic book) 000941648 035__ $$a(MiAaPQ)EBC1463579 000941648 035__ $$a(Au-PeEL)EBL1463579 000941648 035__ $$a(CaPaEBR)ebr10778509 000941648 035__ $$a(OCoLC)860626137 000941648 040__ $$aMiAaPQ$$beng$$erda$$epn$$cMiAaPQ$$dMiAaPQ 000941648 050_4 $$aQA76.9.A25$$bC35 2013 000941648 0820_ $$a78 000941648 1001_ $$aCalder, Alan. 000941648 24510 $$aISO27001 / ISO27002 :$$ba pocket guide /$$cAlan Calder. 000941648 250__ $$aSecond edition. 000941648 264_1 $$aEly, Cambridgeshire, United Kingdom :$$bIT Governance Publishing,$$c2013. 000941648 300__ $$a1 online resource (78 pages) 000941648 336__ $$atext$$2rdacontent 000941648 337__ $$acomputer$$2rdamedia 000941648 338__ $$aonline resource$$2rdacarrier 000941648 506__ $$aAccess limited to authorized users. 000941648 588__ $$aDescription based on online resource; title from PDF title page (ebrary, viewed November 1, 2013). 000941648 650_0 $$aComputer security. 000941648 650_0 $$aData protection. 000941648 650_0 $$aBusiness enterprises$$xComputer networks$$xSecurity measures. 000941648 852__ $$bebk 000941648 85640 $$3ProQuest Ebook Central Academic Complete $$uhttps://univsouthin.idm.oclc.org/login?url=https://ebookcentral.proquest.com/lib/usiricelib-ebooks/detail.action?docID=1463579$$zOnline Access 000941648 909CO $$ooai:library.usi.edu:941648$$pGLOBAL_SET 000941648 980__ $$aEBOOK 000941648 980__ $$aBIB 000941648 982__ $$aEbook 000941648 983__ $$aOnline