The Weak link in IT security
Contenido multimedia no disponible por derechos de autor o por acceso restringido. Contacte con la institución para más información.
Tag | 1 | 2 | Valor |
---|---|---|---|
LDR | 00000nab a2200000 i 4500 | ||
001 | MAP20071505659 | ||
003 | MAP | ||
005 | 20080418124747.0 | ||
007 | hzruuu---uuuu | ||
008 | 040901e20040701usa|||| | |00010|eng d | ||
040 | $aMAP$bspa | ||
084 | $a86 | ||
100 | 1 | $0MAPA20080035006$aWade, Jared | |
245 | 1 | 4 | $aThe Weak link in IT security$cJared Wade |
520 | 8 | $aIncreasingly powerful IT applications have become the mainstay of modern business technology. The risk of viruses, unauhorized data access and electronic vandalims, however, all make strong IT a must. Nevertheless, most employees still understand very little about computer viruses, how they work or where they come from | |
650 | 1 | 1 | $0MAPA20080603731$aSeguridad informática |
650 | 1 | 1 | $0MAPA20080586546$aNuevas tecnologías |
650 | 1 | 1 | $0MAPA20080588694$aVirus informáticos |
650 | 1 | 1 | $0MAPA20080544119$aHackers |
650 | 1 | 1 | $0MAPA20080546991$aEmpresas |
740 | 0 | $aRisk management | |
773 | 0 | $tRisk management$dNew York$gnº 7, July 2004 ; p. 32-37 |