000 | 01781cam^a2200385^a^4500 | ||
---|---|---|---|
001 | UDM01000144202 | ||
003 | UDM | ||
005 | 20210531135017.0 | ||
008 | 121022s2011^^^^flua^^^^^b^^^^001^0^eng^^ | ||
020 |
_a1439827338 _q(alk. paper) |
||
020 |
_a9781439827338 _q(alk. paper) |
||
040 |
_aDLC _cDLC _dYDX _dBTCTA _dYDXCP _dBWX _dCDX _dVLB _dUN@ |
||
082 | 0 | 4 |
_a005.8 _bS775s 2011 |
100 | 1 |
_9282167 _aStackpole, Bill, _eautor |
|
245 | 1 | 0 |
_aSecurity strategy : _bfrom requirements to reality / _cBill Stackpole and Eric Oksendahl. |
264 | 3 | 1 |
_aBoca Raton, FL : _bCRC Press, _cc2011. |
300 |
_axxiii, 321 páginas : _bilustraciones ; _c26 cm. |
||
336 |
_atexto _btxt _2rdacontent |
||
337 |
_ano mediado _bn _2rdamedia |
||
338 |
_avolumen _bnc _2rdacarrier |
||
504 | _aIncluye bibliografía. | ||
505 | 0 | _aStrategy : an introduction -- Getting the big picture -- Testing the consumer -- Strategic framework (imputs to strategic planning) -- Developing a strategic planning process -- Gates, geeks, and guards (security convergence) -- Tactics : an introduction -- Layer upon layer (defense in depth) -- Did you see that! (observation) -- Trust but verify (accountability) -- SDL and incident response -- Keep your enemies closer -- Hire a Hessian (outsourcing) -- Security awareness training. | |
650 | 1 | 4 |
_9101284 _aComputadores _xSeguridad. |
650 | 1 | 4 |
_9352638 _aTecnología de la información. _xMedidas de seguridad. |
700 | 1 |
_9254813 _aOksendahl, Eric. _eautor |
|
942 |
_2ddc _cGEN |
||
991 |
_aADM _aOT12 _a000101339, Teviño Ayala, Ma. Eloisa. |
||
991 |
_aC0 _bUN@ |
||
997 |
_aHZ _b00 _c20140722 _lUDM01 _h1028 |
||
998 |
_aBATCH-UPD _b00 _c20150424 _lUDM01 _h0040 |
||
999 |
_c131975 _d131975 |
||
900 | _aDSÑ | ||
900 | _aAYN | ||
900 | _aTC |