000 01253nam a2200337 a 4500
005 20250918162435.0
008 120626s2011 flua 001 0 eng
020 _a9781439879153 (hbk. : CRC Press)
_cRM301.52
020 _a9782940222537 (EPFL Press)
039 9 _a201207241428
_bariff
_c201207181049
_dmaslia
_c201207181046
_dmaslia
_y06-26-2012
_zmazarita
040 _aUKM
090 _aTK5105.59.T377 3
090 _aTK5105.59
_b.T377 3
100 1 _aTashi, Igli.
245 1 0 _aInformation security evaluation :
_ba holistic approach /
_cIgli Tashi and Solange Ghernaouti-Helie.
260 _aBoca Raton :
_bCRC Press,
_c2011.
300 _axii, 201 p. :
_bill. ;
_c24 cm.
490 1 _aManagement of technology series.
504 _aIncludes bibliographical references (p. [195]-198) and index.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aData protection.
700 1 _aGhernaouti-Hélie, Solange.
830 0 _aManagement of technology series.
907 _a.b15414152
_b2019-11-12
_c2019-11-12
942 _c01
_n0
_kTK5105.59.T377 3
914 _avtls003506397
990 _amms
991 _aFakulti Teknologi dan Sains Maklumat
998 _al
_b2012-01-06
_cm
_da
_feng
_gflu
_y0
_z.b15414152
999 _c524843
_d524843