The Weak link in IT security
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
<record>
<leader>00000nab a2200000 i 4500</leader>
<controlfield tag="001">MAP20071505659</controlfield>
<controlfield tag="003">MAP</controlfield>
<controlfield tag="005">20080418124747.0</controlfield>
<controlfield tag="007">hzruuu---uuuu</controlfield>
<controlfield tag="008">040901e20040701usa|||| | |00010|eng d</controlfield>
<datafield tag="040" ind1=" " ind2=" ">
<subfield code="a">MAP</subfield>
<subfield code="b">spa</subfield>
</datafield>
<datafield tag="084" ind1=" " ind2=" ">
<subfield code="a">86</subfield>
</datafield>
<datafield tag="100" ind1="1" ind2=" ">
<subfield code="0">MAPA20080035006</subfield>
<subfield code="a">Wade, Jared</subfield>
</datafield>
<datafield tag="245" ind1="1" ind2="4">
<subfield code="a">The Weak link in IT security</subfield>
<subfield code="c">Jared Wade</subfield>
</datafield>
<datafield tag="520" ind1="8" ind2=" ">
<subfield code="a">Increasingly powerful IT applications have become the mainstay of modern business technology. The risk of viruses, unauhorized data access and electronic vandalims, however, all make strong IT a must. Nevertheless, most employees still understand very little about computer viruses, how they work or where they come from</subfield>
</datafield>
<datafield tag="650" ind1="1" ind2="1">
<subfield code="0">MAPA20080603731</subfield>
<subfield code="a">Seguridad informática</subfield>
</datafield>
<datafield tag="650" ind1="1" ind2="1">
<subfield code="0">MAPA20080586546</subfield>
<subfield code="a">Nuevas tecnologías</subfield>
</datafield>
<datafield tag="650" ind1="1" ind2="1">
<subfield code="0">MAPA20080588694</subfield>
<subfield code="a">Virus informáticos</subfield>
</datafield>
<datafield tag="650" ind1="1" ind2="1">
<subfield code="0">MAPA20080544119</subfield>
<subfield code="a">Hackers</subfield>
</datafield>
<datafield tag="650" ind1="1" ind2="1">
<subfield code="0">MAPA20080546991</subfield>
<subfield code="a">Empresas</subfield>
</datafield>
<datafield tag="740" ind1="0" ind2=" ">
<subfield code="a">Risk management</subfield>
</datafield>
<datafield tag="773" ind1="0" ind2=" ">
<subfield code="t">Risk management</subfield>
<subfield code="d">New York</subfield>
<subfield code="g">nº 7, July 2004 ; p. 32-37</subfield>
</datafield>
</record>
</collection>