*001679660
*00520230315120807.0
*007ta
*008140410s2013 xx# 000 u eng d
*00901576cam a2200325 c 4500
*019 $bl
*020 $a9781430251132$qh.
*035 $a(EXLNZ-47BIBSYS_NETWORK)991416751364702201
*035 $a(NO-LaBS)14361880(bibid)
*035 $a(NO-TrBIB)141675136
*035 $a141675136-47bibsys_network
*040 $aNO-TrBIB$bnob$ekatreg
*080 $a004.056
*1001 $aHarkins, Malcolm$0(NO-TrBIB)14024107$_96665100
*24510$aManaging risk and information security :$bprotect to enable$cMalcolm Harkins
*260 $a[New York]$bApress Media$cc2013
*300 $aXVII, 134 s.$bill
*4901 $aThe expert's voice in information technology
*653 $ainformasjonssikkerhet$adatasikkerhet$_10501100
*7760 $tManaging risk and information security : protect to enable$w991310081294702201
*830 0$aExpert's voice in information technology$_96665200
*85642$3Forlagets beskrivelse (kort)$uhttps://contents.bibs.aws.unit.no/content/?isbn=9781430251132
*85642$3Forlagets beskrivelse (lang)$uhttps://contents.bibs.aws.unit.no/?isbn=1430251131
*85642$3Forlagets beskrivelse (lang)$uhttps://contents.bibs.aws.unit.no/content/?isbn=9781430251132
*85642$3Innholdsfortegnelse$uhttps://contents.bibs.aws.unit.no/?isbn=1430251131
*85642$3Innholdsfortegnelse$uhttps://contents.bibs.aws.unit.no/content/?isbn=9781430251132
*85642$3Omslagsbilde$uhttps://contents.bibs.aws.unit.no/files/images/large/2/3/9781430251132.jpg$qimage/jpeg
*85642$3Omslagsbilde$uhttps://contents.bibs.aws.unit.no/files/images/small/2/3/9781430251132.jpg$qimage/jpeg
*901 $a80
*999 $aoai:nb.bibsys.no:999919956366402202$b2021-11-14T20:41:14Z$z999919956366402202
^