000 | 01446naaaa2200373uu 4500 | ||
---|---|---|---|
001 | http://library.oapen.org/handle/20.500.12657/28145 | ||
005 | 20230323120727.0 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20181101s2013 xx |||||o ||| 0|eng d | ||
020 | _a978-1-4302-5114-9 | ||
020 | _a9781430251149 | ||
040 |
_aoapen _coapen |
||
024 | 7 |
_a10.1007/978-1-4302-5114-9 _cdoi |
|
041 | 0 | _aeng | |
042 | _adc | ||
072 | 7 |
_aUY _2bicssc |
|
100 | 1 |
_aHarkins, Malcolm W. _4auth |
|
245 | 1 | 0 | _aManaging Risk and Information Security: Protect to Enable (First Edition) |
260 |
_bSpringer Nature _c2013 |
||
300 | _a1 electronic resource (152 p.) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
506 | 0 |
_aOpen Access _2star _fUnrestricted online access |
|
520 | _aComputer science | ||
540 |
_aCreative Commons _fhttps://creativecommons.org/licenses/by-nc/4.0/ _2cc _4https://creativecommons.org/licenses/by-nc/4.0/ |
||
546 | _aEnglish | ||
650 | 7 |
_aComputer science _2bicssc |
|
653 | _aComputer science | ||
856 | 4 | 0 |
_awww.oapen.org _uhttps://library.oapen.org/bitstream/id/b0ba7ee8-7a1e-45d8-a555-a1e18c9233b1/1001849.pdf _70 _zOAPEN Library: download the publication |
856 | 4 | 0 |
_awww.oapen.org _uhttp://library.oapen.org/handle/20.500.12657/28145 _70 _zOAPEN Library: description of the publication |
999 |
_c6133 _d6133 |
||
909 |
_a4 _bDarya Shvetsova _c4 _dDarya Shvetsova |