{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BC11510062.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BC11510062#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BC11510062.json"},"dc:title":[{"@value":"Building an effective security program"}],"dc:creator":"Chris K. Williams, Scott E. Donaldson, and Stanley G. Siegel","dc:publisher":[{"@value":"De Gruyter"}],"dcterms:extent":"xix, 425 p.","cinii:size":"23 cm","dc:language":"eng","dc:date":"2020","cinii:ncid":"BC11510062","cinii:ownerCount":"2","foaf:maker":[{"@type":"foaf:Person","foaf:name":[{"@value":"Williams, Chris K."}]},{"@type":"foaf:Person","foaf:name":[{"@value":"Donaldson, Scott E."}]},{"@id":"https://ci.nii.ac.jp/author/DA07675592#entity","@type":"foaf:Person","foaf:name":[{"@value":"Siegel, Stanley G."}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA028863","@type":"foaf:Organization","foaf:name":"京都先端科学大学 京都太秦キャンパス図書館","rdfs:seeAlso":{"@id":"https://opackuas.azurewebsites.net/Main/Opensearch?ncid=BC11510062"}},{"@id":"https://ci.nii.ac.jp/library/FA028557","@type":"foaf:Organization","foaf:name":"東京情報デザイン専門職大学 附属図書館","rdfs:seeAlso":{"@id":"https://lib-finder.net/tid/search?ncid=BC11510062"}}],"bibo:lccn":["2020939274"],"rdfs:seeAlso":[{"@id":"https://lccn.loc.gov/2020939274"}],"prism:publicationDate":["c2020"],"cinii:note":["Includes index"],"dc:subject":["DC23:005.8","LCC:QA76.9.A25"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+security","dc:title":"Computer security"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+networks+--+Security+measures","dc:title":"Computer networks -- Security measures"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+Security","dc:title":"Computer Security"},{"@id":"https://ci.nii.ac.jp/books/search?q=S%C3%A9curit%C3%A9+informatique","dc:title":"Sécurité informatique"},{"@id":"https://ci.nii.ac.jp/books/search?q=R%C3%A9seaux+d%27ordinateurs+--+S%C3%A9curit%C3%A9+--+Mesures","dc:title":"Réseaux d'ordinateurs -- Sécurité -- Mesures"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+networks+--+Security+measures.+fast+%28OCoLC%29fst00872341","dc:title":"Computer networks -- Security measures. fast (OCoLC)fst00872341"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+security.+fast+%28OCoLC%29fst00872484","dc:title":"Computer security. fast (OCoLC)fst00872484"}],"dcterms:isPartOf":[{"@id":"https://ci.nii.ac.jp/ncid/BC05283782#entity","dc:title":"Business & Economics","@type":"bibo:Book"}],"dcterms:hasPart":[{"@id":"urn:isbn:9781501515248"}]}]}