Detail
Raw data [ X ]
<section name="raw"> <SEQUENTIAL> <record key="001" att1="001" value="167044" att2="167044">001 167044</record> <field key="037" subkey="x">englisch</field> <field key="050" subkey="x">Graue Literatur</field> <field key="076" subkey="">Ökonomie</field> <field key="079" subkey="y">http://go.worldbank.org/0LKRVCK1F0</field> <field key="079" subkey="z">Glaessner, Thomas C. - et al., Electronic Safety and Soundness (World Bank Publication)</field> <field key="079" subkey="y">http://books.google.com/books?id=Yk5P-5gOdU4C&printsec=frontcover</field> <field key="079" subkey="z">Glaessner, Thomas C. - et al., Electronic Safety and Soundness (Google Book Search)</field> <field key="100" subkey="">Glaessner, Thomas C.</field> <field key="103" subkey="">Lead Financial Economist in the Financial Sector Operations and Policy Department of The World Bank</field> <field key="104" subkey="a">Kellermann, Tom</field> <field key="107" subkey="">Senior Data Risk Management Specialist in the Financial Sector Operations and Policy Department of The World Bank</field> <field key="108" subkey="a">McNevin, Valerie</field> <field key="111" subkey="">Security Information Officer for the State of Colorado</field> <field key="112" subkey="b">Calari, Cesare (Pr.)</field> <field key="200" subkey="b">The World Bank (Ed.)</field> <field key="331" subkey="">Electronic Safety and Soundness</field> <field key="335" subkey="">Securing Finance in a New Age</field> <field key="403" subkey="">1. Ed.</field> <field key="410" subkey="">Washington, D.C.</field> <field key="412" subkey="">The World Bank</field> <field key="425" subkey="">2004, February</field> <field key="433" subkey="">ix, 174 pp.</field> <field key="451" subkey="">World Bank Working Paper; No. 26</field> <field key="517" subkey="c">from the Table of Contents: Foreword; Abstract; Preface; Executive Summary; Introduction to E-Security; Policy Framework; Legal</field> <field key="and" subkey="">Regulatory Framework (Pillar 1); External Monitoring of E-Security Practices (Pillar 2); Certifications, Policies, Standards,</field> <field key="and" subkey="">Procedures (Pillar 3); Twelve Layers of Security (Pillar 4); Annexes; Glossary; References; List of Boxes; List of Figures;</field> <field key="Lis" subkey="t">of Tables;</field> <field key="540" subkey="">0-8213-5759-X</field> <field key="542" subkey="">1726-5878</field> <field key="544" subkey="">WB167044</field> <field key="700" subkey="b">332</field> <field key="700" subkey="b">Financial economics</field> <field key="710" subkey="">Electronic funds transfers -- Security measures</field> <field key="710" subkey="">Electronic security systems</field> </SEQUENTIAL> </section> Servertime: 0.077 sec | Clienttime:
sec
|