<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>01922nam a2200265 a 4500</leader>
  <controlfield tag="001">TVCDKTCT8621</controlfield>
  <controlfield tag="003">Thư viện trường Cao đẳng Kỹ thuật Cao Thắng</controlfield>
  <controlfield tag="005">20080304000000</controlfield>
  <controlfield tag="008">080304</controlfield>
  <datafield tag="980" ind1="\" ind2="\">
   <subfield code="a">Thư viện Trường CĐ Kỹ Thuật Cao Thắng</subfield>
  </datafield>
  <datafield tag="024" ind1=" " ind2=" ">
   <subfield code="a">RG_1 #1 eb0 i1</subfield>
  </datafield>
  <datafield tag="020" ind1="#" ind2="#">
   <subfield code="a">0471680877</subfield>
  </datafield>
  <datafield tag="041" ind1="0" ind2="#">
   <subfield code="a">vie</subfield>
  </datafield>
  <datafield tag="082" ind1="#" ind2="#">
   <subfield code="a">621.3 / </subfield>
   <subfield code="b">D200F-j</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2="#">
   <subfield code="a">Babiak Jan</subfield>
  </datafield>
  <datafield tag="245" ind1="0" ind2="0">
   <subfield code="a">Defending the Digital Frontier: Practical Security for Management, 2nd Edition /</subfield>
   <subfield code="c">Babiak Jan, Butters John, W.Doll Mark</subfield>
  </datafield>
  <datafield tag="260" ind1="#" ind2="#">
   <subfield code="a">American :</subfield>
   <subfield code="b">Wiley ,</subfield>
   <subfield code="c">2004</subfield>
  </datafield>
  <datafield tag="300" ind1="#" ind2="#">
   <subfield code="a">253tr.</subfield>
  </datafield>
  <datafield tag="520" ind1="#" ind2="#">
   <subfield code="a">Enhance the digital security knowledge-base within any organization</subfield>
  </datafield>
  <datafield tag="520" ind1="#" ind2="#">
   <subfield code="a">In today's competitive business environment, information and information technology have become crucial for a company's success. Ensuring the confidentiality of such information-financial, trade secrets, and the like-has become key. Defending the Digital Frontier, Second Edition describes where organizations are vulnerable and identifies protective measures that rely on people and process as much as technology. This book is a practical guide aimed at business leaders and executives, explaining why digital security is not a technical function, but a risk management operation, and illustrates an approach for creating an enterprise-wide security culture based on business-led risk-management principles.</subfield>
  </datafield>
  <datafield tag="520" ind1="#" ind2="#">
   <subfield code="a">Ernst &amp; Young is a global leader in professional services, providing tax, assurance, and transaction advice to thousands of individuals as well as domestic and global businesses. Ernst &amp; Young provides independent security solutions for some of the world's most information-intensive organizations, including numerous Fortune 500 companies, and the federal government.</subfield>
  </datafield>
  <datafield tag="650" ind1="#" ind2="4">
   <subfield code="a">Digital Security Survey</subfield>
  </datafield>
  <datafield tag="650" ind1="#" ind2="4">
   <subfield code="a">Head of Security</subfield>
  </datafield>
  <datafield tag="700" ind1="0" ind2="#">
   <subfield code="a">Butters John</subfield>
  </datafield>
  <datafield tag="700" ind1="0" ind2="#">
   <subfield code="a">W.Doll Mark</subfield>
  </datafield>
 </record>
</collection>
