007 |
|
co cg |
020 |
|
|a0849339472 :|cNT|6458
|
040 |
|
|aTWNTU|cTWNTU|dTWNTU
|
082 |
4
|
|a658.0558|bI43 T59 A
|
095 |
|
|aNTTU|bG|cD013244|d658.0558|eI43|pCDR|fSYNSIA|zAV|m0|tDDC
|
245 |
00
|
|aInformation security management handbook 2005|h[electronic resource] /|cedited by Harold F. Tipton, Micki Krause.
|
246 |
3
|
|aInformation security management handbook.
|
246 |
1
|
|iTitle on disc label:|aInformation security management handbook on CD-ROM.
|
250 |
|
|a2005 ed.
|
260 |
|
|aBoca Raton, Fla. :|bAuerbach,|cc2005.
|
300 |
|
|a1 CD-ROM :|bsd., col. ;|c4 3/4 in.
|
500 |
|
|aTitle from title screen.
|
530 |
|
|aAlso availalbe in print.
|
538 |
|
|aSystem requirements: Pentium 1 processor or higher; 16MB RAM; Wincdows 95, 98, 2000, ME, NT 4.x or XP; Adobe Acrobat Reader 5.0 or higher (Acrobat Reader 7.0 installation included); 15MB available disk space; SVGA monitor at 800x600, 256 colors; CD-ROM drive (4x).
|
650 |
0
|
|aComputer security|xManagement|vHandbooks, manuals, etc.
|
650 |
0
|
|aData protection|vHandbooks, manuals, etc.
|
700 |
1
|
|aTipton, Harold F.
|
700 |
1
|
|aKrause, Micki.
|
776 |
1
|
|tInformation security management|b5th ed.|cPrint|z0849319978 (v. 1)|z0849332109 (v. 2)
|
809 |
|
|d658.0558|eI43|tDDC|pCDR
|