|
|
|
|
LEADER |
01586nam a2200517 a 4500 |
001 |
1923086 |
005 |
20171111235757.0 |
008 |
050525s2003 gr r u000 0 eng d |
020 |
|
|
|a 0131857940
|
040 |
|
|
|a GR-AtUEB
|b gre
|e AACR2
|
082 |
|
0 |
|a 005.8
|
082 |
|
0 |
|2 21
|a 005.8
|
082 |
|
0 |
|2 21
|a 005.8
|
100 |
1 |
0 |
|a Pfleeger, Charles P.
|
245 |
0 |
0 |
|a Security in computing
|
250 |
0 |
0 |
|a 3rd ed
|
260 |
0 |
0 |
|a Upper Saddle River:
|b Prentice-Hall,
|c 2003
|
300 |
0 |
0 |
|a xxix, 746p. :
|b fig.
|
500 |
0 |
0 |
|a Bibliography: p.691-725
|
500 |
0 |
0 |
|a Includes index
|
500 |
0 |
0 |
|a International edition.
|
504 |
0 |
0 |
|a Περιέχει βιβλιογραφία και ευρετήριο
|
504 |
0 |
0 |
|a Includes bibliography and index.
|
650 |
1 |
7 |
|a Computers
|
650 |
1 |
7 |
|a Data protection
|
650 |
1 |
7 |
|a Computer crime
|
650 |
1 |
7 |
|a Information services
|
650 |
1 |
7 |
|a Ethics
|
650 |
1 |
7 |
|a Computer networks
|
650 |
1 |
7 |
|a Information management
|
650 |
1 |
7 |
|a Operating systems
|
650 |
1 |
7 |
|a Access to information
|
650 |
1 |
7 |
|a Confidentiality
|
650 |
1 |
7 |
|a Information policy
|
650 |
1 |
7 |
|a Privacy protection
|
650 |
1 |
7 |
|a Electronic equipment
|
650 |
1 |
7 |
|a Computer programs
|
650 |
1 |
7 |
|a Information
|
650 |
1 |
7 |
|a Case studies
|
650 |
1 |
7 |
|a Electronic data processing
|
650 |
1 |
7 |
|a Databases
|
650 |
1 |
0 |
|a Computer security
|
650 |
1 |
0 |
|a Data protection
|
700 |
1 |
0 |
|a Plfeeger, Shari Lawrence
|
952 |
|
|
|a GRThAnMak
|b 59cca0176c5ad13446022388
|c 998a
|d 945l
|e 005.8 PFL
|t 11
|x m
|z Books
|
952 |
|
|
|a CY-NiOUC
|b 5a0444b56c5ad14ac1eae889
|c 998a
|d 945l
|e QA76.9.A25P45 1997
|t 1
|x m
|z Books
|