mdmFacet
Apr May 2024 Jun
MoTuWeThFrSaSu
   1  2  3  4  5
  6  7  8  9101112
13141516171819
20212223242526
2728293031 

Detail

EuropeanaInformation 
Raw data [ X ]
<section name="raw">
    <SEQUENTIAL>
      <record key="001" att1="001" value="167044" att2="167044">001   167044</record>
      <field key="037" subkey="x">englisch</field>
      <field key="050" subkey="x">Graue Literatur</field>
      <field key="076" subkey="">Ökonomie</field>
      <field key="079" subkey="y">http://go.worldbank.org/0LKRVCK1F0</field>
      <field key="079" subkey="z">Glaessner, Thomas C. - et al., Electronic Safety and Soundness (World Bank Publication)</field>
      <field key="079" subkey="y">http://books.google.com/books?id=Yk5P-5gOdU4C&amp;printsec=frontcover</field>
      <field key="079" subkey="z">Glaessner, Thomas C. - et al., Electronic Safety and Soundness (Google Book Search)</field>
      <field key="100" subkey="">Glaessner, Thomas C.</field>
      <field key="103" subkey="">Lead Financial Economist in the Financial Sector Operations and Policy Department of The World Bank</field>
      <field key="104" subkey="a">Kellermann, Tom</field>
      <field key="107" subkey="">Senior Data Risk Management Specialist in the Financial Sector Operations and Policy Department of The World Bank</field>
      <field key="108" subkey="a">McNevin, Valerie</field>
      <field key="111" subkey="">Security Information Officer for the State of Colorado</field>
      <field key="112" subkey="b">Calari, Cesare (Pr.)</field>
      <field key="200" subkey="b">The World Bank (Ed.)</field>
      <field key="331" subkey="">Electronic Safety and Soundness</field>
      <field key="335" subkey="">Securing Finance in a New Age</field>
      <field key="403" subkey="">1. Ed.</field>
      <field key="410" subkey="">Washington, D.C.</field>
      <field key="412" subkey="">The World Bank</field>
      <field key="425" subkey="">2004, February</field>
      <field key="433" subkey="">ix, 174 pp.</field>
      <field key="451" subkey="">World Bank Working Paper; No. 26</field>
      <field key="517" subkey="c">from the Table of Contents: Foreword; Abstract; Preface; Executive Summary; Introduction to E-Security; Policy Framework; Legal</field>
      <field key="and" subkey="">Regulatory Framework (Pillar 1); External Monitoring of E-Security Practices (Pillar 2); Certifications, Policies, Standards,</field>
      <field key="and" subkey="">Procedures (Pillar 3); Twelve Layers of Security (Pillar 4); Annexes; Glossary; References; List of Boxes; List of Figures;</field>
      <field key="Lis" subkey="t">of Tables;</field>
      <field key="540" subkey="">0-8213-5759-X</field>
      <field key="542" subkey="">1726-5878</field>
      <field key="544" subkey="">WB167044</field>
      <field key="700" subkey="b">332</field>
      <field key="700" subkey="b">Financial economics</field>
      <field key="710" subkey="">Electronic funds transfers -- Security measures</field>
      <field key="710" subkey="">Electronic security systems</field>
    </SEQUENTIAL>
  </section>
Servertime: 0.077 sec | Clienttime: sec