| 000 | 01228cam a22003254a 4500 | ||
|---|---|---|---|
| 001 | 13502506 | ||
| 003 | PILC | ||
| 005 | 20150112093430.0 | ||
| 008 | 040226s2004 maua b 001 0 eng | ||
| 010 | _a 2004004424 | ||
| 020 | _a0321197674 | ||
| 040 |
_aDLC _cDLC _dDLC |
||
| 042 | _apcc | ||
| 050 | 0 | 0 |
_aTK 5105.59 _b.G86 2004 |
| 082 | 0 | 0 |
_aCSFr 005.8 _bG86 2004 |
| 100 | 1 |
_aGupta, Ajay. _99744 |
|
| 245 | 1 | 0 |
_aDefend I.T. : security by example / _cAjay Gupta, Scott Laliberte. |
| 246 | 3 | 0 | _aDefend IT, security by example |
| 246 | 1 | 4 | _aSecurity by example, defend I.T. |
| 260 |
_aBoston : _bAddison-Wesley, _c2004. |
||
| 300 |
_a349 pages : _billustration ; _c24 cm. |
||
| 504 | _aIncludes bibliographical references (p. 321-326) and index. | ||
| 650 | 0 |
_aComputer networks _xSecurity measures. _99745 |
|
| 650 | 0 |
_aComputer security. _99722 |
|
| 700 | 1 |
_aLaliberte, Scott. _99746 |
|
| 856 | 4 | 1 |
_3Table of contents _uhttp://www.loc.gov/catdir/toc/ecip0415/2004004424.html |
| 906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
| 942 |
_2lcc _cBK |
||
| 999 |
_c14330 _d14330 |
||