000951208 000__ 01627cam\a2200409\i\4500 000951208 001__ 951208 000951208 005__ 20210515202248.0 000951208 006__ m\\\\\o\\d\\\\\\\\ 000951208 007__ cr\cn\nnnunnun 000951208 008__ 160315s2015\\\\enka\\\\ob\\\\000\0\eng\d 000951208 020__ $$z9781849287678 000951208 020__ $$a9781849287685 (e-book) 000951208 035__ $$a(MiAaPQ)EBC4395800 000951208 035__ $$a(Au-PeEL)EBL4395800 000951208 035__ $$a(CaPaEBR)ebr11155271 000951208 035__ $$a(OCoLC)941700561 000951208 040__ $$aMiAaPQ$$beng$$erda$$epn$$cMiAaPQ$$dMiAaPQ 000951208 050_4 $$aQA76.9.A25$$bV37 2015 000951208 1001_ $$aVasudevan, Vinod,$$eauthor. 000951208 24510 $$aApplication security in the ISO 27001:2013 environment /$$cVinod Vasudevan [and five others]. 000951208 250__ $$aSecond edition. 000951208 264_1 $$aEly Cambridgeshire :$$bIT Governance Publishing,$$c2015. 000951208 300__ $$a1 online resource (254 pages) :$$bcolor illustrations 000951208 336__ $$atext$$2rdacontent 000951208 337__ $$acomputer$$2rdamedia 000951208 338__ $$aonline resource$$2rdacarrier 000951208 504__ $$aIncludes bibliographical references. 000951208 506__ $$aAccess limited to authorized users. 000951208 588__ $$aDescription based on online resource; title from PDF title page (ebrary, viewed March 15, 2016). 000951208 650_0 $$aData protection$$xStandards. 000951208 650_0 $$aComputer security. 000951208 650_0 $$aComputer networks$$xSecurity measures$$xStandards. 000951208 650_0 $$aInformation technology$$xStandards. 000951208 650_0 $$aComputer software$$xReliability. 000951208 852__ $$bebk 000951208 85640 $$3ProQuest Ebook Central Academic Complete $$uhttps://univsouthin.idm.oclc.org/login?url=https://ebookcentral.proquest.com/lib/usiricelib-ebooks/detail.action?docID=4395800$$zOnline Access 000951208 909CO $$ooai:library.usi.edu:951208$$pGLOBAL_SET 000951208 980__ $$aEBOOK 000951208 980__ $$aBIB 000951208 982__ $$aEbook 000951208 983__ $$aOnline