{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BA06559363.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BA06559363#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BA06559363.json"},"dc:title":[{"@value":"Handbook for information security : a guide towards information security standards"}],"dc:creator":"J.C.H. Aalders, I.S. Herschberg, and A. van Zanten","dc:publisher":[{"@value":"North-Holland"},{"@value":"Sole distributors for the U.S.A. and Canada, Elsevier Science Pub. Co."}],"dcterms:extent":"2 v. (loose-leaf)","cinii:size":"32 cm","dc:language":"eng","dc:date":"1985","cinii:ncid":"BA06559363","cinii:ownerCount":"9","foaf:maker":[{"@id":"https://ci.nii.ac.jp/author/DA03004336#entity","@type":"foaf:Person","foaf:name":[{"@value":"Aalders, J. C. H."}]},{"@id":"https://ci.nii.ac.jp/author/DA03004358#entity","@type":"foaf:Person","foaf:name":[{"@value":"Herschberg, I. S."}]},{"@id":"https://ci.nii.ac.jp/author/DA0300437X#entity","@type":"foaf:Person","foaf:name":[{"@value":"Zanten, A. van"}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA001787","@type":"foaf:Organization","foaf:name":"東京大学 総合図書館","rdfs:seeAlso":{"@id":"https://opac.dl.itc.u-tokyo.ac.jp/opac/opac_openurl/?ncid=BA06559363"}},{"@id":"https://ci.nii.ac.jp/library/FA002848","@type":"foaf:Organization","foaf:name":"大阪大学 附属図書館 総合図書館","rdfs:seeAlso":{"@id":"https://opac.library.osaka-u.ac.jp/opac/opac_openurl/?ncid=BA06559363"}},{"@id":"https://ci.nii.ac.jp/library/FA003454","@type":"foaf:Organization","foaf:name":"九州大学 中央図書館","rdfs:seeAlso":{"@id":"https://catalog.lib.kyushu-u.ac.jp/opac_openurl/?ncid=BA06559363"}},{"@id":"https://ci.nii.ac.jp/library/FA004592","@type":"foaf:Organization","foaf:name":"常磐大学 情報メディアセンター","rdfs:seeAlso":{"@id":"https://opaclib.tokiwa.ac.jp/webopac/ctlsrh.do?tab_num=0&ncid=BA06559363"}},{"@id":"https://ci.nii.ac.jp/library/FA012331","@type":"foaf:Organization","foaf:name":"帝京大学 宇都宮キャンパス 図書館","rdfs:seeAlso":{"@id":"https://opac.teikyo-u.ac.jp/iwjs0016opc/ufirdi.do?ufi_target=ctlsrh&ncid=BA06559363"}},{"@id":"https://ci.nii.ac.jp/library/FA007965","@type":"foaf:Organization","foaf:name":"関西大学 図書館","rdfs:seeAlso":{"@id":"https://www.lib.kansai-u.ac.jp/webopac/ufirdi.do?ufi_target=ctlsrh&ncid=BA06559363"}},{"@id":"https://ci.nii.ac.jp/library/FA008662","@type":"foaf:Organization","foaf:name":"福山大学 附属図書館","rdfs:seeAlso":{"@id":"https://library.fukuyama-u.ac.jp/gate?module=search&path=search.do&method=search&searchForm.library=true&searchForm.orderNumber=BA06559363"}},{"@id":"https://ci.nii.ac.jp/library/FA008811","@type":"foaf:Organization","foaf:name":"久留米大学 附属図書館 御井学舎分館","rdfs:seeAlso":{"@id":"http://lib.kurume-u.ac.jp/mylimedio/search/search.do?target=local&mode=comp&ncid=BA06559363"}},{"@id":"https://ci.nii.ac.jp/library/FA013913","@type":"foaf:Organization","foaf:name":"江戸川大学 総合情報図書館"}],"bibo:lccn":["85028367"],"rdfs:seeAlso":[{"@id":"https://lccn.loc.gov/85028367"}],"prism:publicationDate":[null,"c1985"],"cinii:note":["Includes index"],"dc:subject":["LCC:QA76.9.A25","DC19:005.8"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Computers+--+Access+control","dc:title":"Computers -- Access control"},{"@id":"https://ci.nii.ac.jp/books/search?q=Electronic+data+processing+departments+--+Security+measures","dc:title":"Electronic data processing departments -- Security measures"}],"dcterms:hasPart":[{"@id":"urn:isbn:0444876103","dc:title":"U.S. : set"},{"@id":"urn:isbn:0444876081","dc:title":"U.S. : pt. 1"},{"@id":"urn:isbn:044487609X","dc:title":"U.S. : pt. 2"}]}]}