| 000 | 01253nam a2200337 a 4500 | ||
|---|---|---|---|
| 005 | 20250918162435.0 | ||
| 008 | 120626s2011 flua 001 0 eng | ||
| 020 |
_a9781439879153 (hbk. : CRC Press) _cRM301.52 |
||
| 020 | _a9782940222537 (EPFL Press) | ||
| 039 | 9 |
_a201207241428 _bariff _c201207181049 _dmaslia _c201207181046 _dmaslia _y06-26-2012 _zmazarita |
|
| 040 | _aUKM | ||
| 090 | _aTK5105.59.T377 3 | ||
| 090 |
_aTK5105.59 _b.T377 3 |
||
| 100 | 1 | _aTashi, Igli. | |
| 245 | 1 | 0 |
_aInformation security evaluation : _ba holistic approach / _cIgli Tashi and Solange Ghernaouti-Helie. |
| 260 |
_aBoca Raton : _bCRC Press, _c2011. |
||
| 300 |
_axii, 201 p. : _bill. ; _c24 cm. |
||
| 490 | 1 | _aManagement of technology series. | |
| 504 | _aIncludes bibliographical references (p. [195]-198) and index. | ||
| 650 | 0 |
_aComputer networks _xSecurity measures. |
|
| 650 | 0 | _aData protection. | |
| 700 | 1 | _aGhernaouti-Hélie, Solange. | |
| 830 | 0 | _aManagement of technology series. | |
| 907 |
_a.b15414152 _b2019-11-12 _c2019-11-12 |
||
| 942 |
_c01 _n0 _kTK5105.59.T377 3 |
||
| 914 | _avtls003506397 | ||
| 990 | _amms | ||
| 991 | _aFakulti Teknologi dan Sains Maklumat | ||
| 998 |
_al _b2012-01-06 _cm _da _feng _gflu _y0 _z.b15414152 |
||
| 999 |
_c524843 _d524843 |
||