<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>01739nam a2200217Ia 4500</leader>
  <controlfield tag="001">CTU_141129</controlfield>
  <controlfield tag="008">210402s9999    xx            000 0 und d</controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="c">7.87</subfield>
  </datafield>
  <datafield tag="082" ind1=" " ind2=" ">
   <subfield code="a">005.8</subfield>
  </datafield>
  <datafield tag="082" ind1=" " ind2=" ">
   <subfield code="b">R845</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
   <subfield code="a">Rothke, Ben.</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2="0">
   <subfield code="a">Computer security :</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2="0">
   <subfield code="b">20 things every employee should know</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2="0">
   <subfield code="c">Ben Rothke.</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
   <subfield code="a">New York</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
   <subfield code="b">McGraw-Hill</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
   <subfield code="c">2005</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
   <subfield code="a">Securing corporate resources and data in the workplace is everyone's responsibility. Corporate IT security strategies are only as good as the employee's awareness of his or her role in maintaining that strategy. This book presents the risks, responsibilities, and liabilities (known and unknown) of which every employee should be aware, as well as simple protective steps to keep corporate data and systems secure. Inside this easy-to-follow guide, you'll find 20 lessons you can use to ensure that you are doing your part to protect corporate systems and privileged data.The topics covered include: Phishing and spyware; Identity theft; Workplace access; Passwords viruses and malware'; Remote access; E-mail; Web surfing and Internet use; Instant messaging; Personal firewalls and patches; Hand-held devices; Data backup; Management of sensitive information; Social engineering tactics; and, Use of corporate resources. Ben Rothke, CISSP, CISM, is a New York City-based senior security consultant with ThruPoint, Inc. He has more than 15 years of industry experience in the area of information systems security and privacy.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2=" ">
   <subfield code="a">Computer security,Data protection,Bảo vệ máy tính,Bảo mật dữ liệu</subfield>
  </datafield>
  <datafield tag="904" ind1=" " ind2=" ">
   <subfield code="i">Năm</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
   <subfield code="a">Trung tâm Học liệu Trường Đại học Cần Thơ</subfield>
  </datafield>
 </record>
</collection>
