Search

The Weak link in IT security

Fichero PDF / PDF file
MARC record
Tag12Value
LDR  00000nab a2200000 i 4500
001  MAP20071505659
003  MAP
005  20080418124747.0
007  hzruuu---uuuu
008  040901e20040701usa|||| | |00010|eng d
040  ‎$a‎MAP‎$b‎spa
084  ‎$a‎86
1001 ‎$0‎MAPA20080035006‎$a‎Wade, Jared
24514‎$a‎The Weak link in IT security‎$c‎Jared Wade
5208 ‎$a‎Increasingly powerful IT applications have become the mainstay of modern business technology. The risk of viruses, unauhorized data access and electronic vandalims, however, all make strong IT a must. Nevertheless, most employees still understand very little about computer viruses, how they work or where they come from
65011‎$0‎MAPA20080603731‎$a‎Seguridad informática
65011‎$0‎MAPA20080586546‎$a‎Nuevas tecnologías
65011‎$0‎MAPA20080588694‎$a‎Virus informáticos
65011‎$0‎MAPA20080544119‎$a‎Hackers
65011‎$0‎MAPA20080546991‎$a‎Empresas
7400 ‎$a‎Risk management
7730 ‎$t‎Risk management‎$d‎New York‎$g‎nº 7, July 2004 ; p. 32-37