02151nam a2200445Ia 4500001001200000003000800012006001900020007001500039008004100054010001700095020001500112020001500127040002100142035002000163050002600183111008200209245014600291260004800437300002400485500014200509504005100651533015200702650007600854650005600930650005400986650003501040650003301075650009101108650007101199650006901270650005001339650004801389655002901437700002501466700002501491700002901516710001701545856012601562999001701688ebr10088548CaPaEBRm u cr cn|||||||||040206s2004 nyua sb 101 0 eng d z 2004044179 z0306486385 z0306484943 aCaPaEBRcCaPaEBR a(OCoLC)5553771114aHD30.38b.M325 2002eb2 aManagement of Technology Symposiumd(2002 :cStevens Institute of Technology)10aGuarding your businessh[electronic resource] :ba management approach to security /cedited by Sumit Ghosh, Manu Malek, and Edward A. Stohr. aNew York :bKluwer Academic/Plenum,cc2004. axiv, 252 p. :bill. a"Proceedings of the Management of Technology (MOT) Symposium held at Stevens Institute of Technology during October 22-24, 2002"--Introd. aIncludes bibliographical references and index. aElectronic reproduction.bPalo Alto, Calif. :cebrary,d2009.nAvailable via World Wide Web.nAccess may be limited to ebrary affiliated libraries. 0aBusiness enterprisesxComputer networksxSecurity measuresvCongresses. 0aElectronic commercexSecurity measuresvCongresses. 0aComputer networksxSecurity measuresvCongresses. 0aComputer securityvCongresses. 0aData protectionvCongresses. 0aBusiness enterprisesxComputer networksxSecurity measureszUnited StatesvCongresses. 0aElectronic commercexSecurity measureszUnited StatesvCongresses. 0aComputer networksxSecurity measureszUnited StatesvCongresses. 0aComputer securityzUnited StatesvCongresses. 0aData protectionzUnited StatesvCongresses. 7aElectronic books.2local1 aGhosh, Sumit,d1958-1 aMalek-Zavarei, Manu.1 aStohr, Edward A.,d1936-2 aebrary, Inc.40uhttp://site.ebrary.com/lib/rucke/Doc?id=10088548zAn electronic book accessible through the World Wide Web; click to view c52006d52006