005 |
|
20090710173754.0 |
010 |
|
|a 2008051169
|
015 |
|
|aGBA937433|2bnb
|
020 |
|
|a9781605662107 :|cNT|6361
|
020 |
|
|a1605662100
|
020 |
|
|a9781605662114 (ebk.)
|
020 |
|
|a1605662119 (ebk.)
|
035 |
|
|a00045505
|
035 |
|
|a(OCoLC)286505362
|
035 |
|
|a(OCoLC)ocn286505362
|
040 |
|
|aTWNTU|cTWNTU|dTWNTU
|
041 |
0
|
|aeng
|
042 |
|
|alcac
|
050 |
00
|
|aHF5548.37|b.T43 2009
|
082 |
00
|
|a658.4/78|222
|
095 |
|
|aNTTU|bG|cE045505|d658.478|eT255|pBOOK|fCKY|zBOOK|m0|tDDC
|
245 |
00
|
|aTechniques and applications for advanced information privacy and security :|bemerging organizational, ethical, and human issues /|c[edited by] Hamid R. Nemati.
|
260 |
|
|aHershey, PA :|bInformation Science Reference,|c2009.
|
300 |
|
|axxxiv, 378 p. :|bill. ;|c29 cm.
|
500 |
|
|a"Premier reference source"--Cover.
|
504 |
|
|aIncludes bibliographical references and index.
|
520 |
|
|a"This book provides a thorough understanding of issues and concerns in information technology security"--Provided by publisher.
|
650 |
0
|
|aElectronic commerce|xSecurity measures.
|
650 |
0
|
|aInformation technology|xSecurity measures.
|
650 |
0
|
|aComputer security.
|
650 |
0
|
|aData protection.
|
700 |
1
|
|aNemati, Hamid R.,|d1958-
|
809 |
|
|d658.478|eT255|tDDC|pBOOK
|