Búsqueda

Risk in a web 2.0 world

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cab a2200000   4500</leader>
    <controlfield tag="001">MAP20080044374</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20091026130213.0</controlfield>
    <controlfield tag="008">081119e20081001usa           00010 eng  </controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">7</subfield>
    </datafield>
    <datafield tag="100" ind1=" " ind2=" ">
      <subfield code="0">MAPA20080658632</subfield>
      <subfield code="a">Short, Jason</subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="0">
      <subfield code="a">Risk in a web 2.0 world</subfield>
      <subfield code="c">by Jason Short</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">Interaction, openness, knowledge-sharing and malleability are the new online currency. The internet has always represented a security challenge, but with the emergence of Web 2.0, the next generation of internet-based services that emphasizes social interaction and user-driven content, and its reliance on open-ended, user-generated content, things just got even more complicated.</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20090003200</subfield>
      <subfield code="a">Web 2.0</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20080631925</subfield>
      <subfield code="a">Nuevas tecnologías de la información</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20080622251</subfield>
      <subfield code="a">Seguridad de la información</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20080603700</subfield>
      <subfield code="a">Seguridad de sistemas</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20080588953</subfield>
      <subfield code="a">Análisis de riesgos</subfield>
    </datafield>
    <datafield tag="773" ind1="0" ind2=" ">
      <subfield code="w">MAP20077000291</subfield>
      <subfield code="t">Risk Management Magazine</subfield>
      <subfield code="d">New York : Risk and Insurance Management Society, 1982-</subfield>
      <subfield code="x">0035-5593</subfield>
      <subfield code="g">01/10/2008 Tomo 55 Número 10  - 2008, 4 p.</subfield>
    </datafield>
  </record>
</collection>