000 01228cam a22003254a 4500
001 13502506
003 PILC
005 20150112093430.0
008 040226s2004 maua b 001 0 eng
010 _a 2004004424
020 _a0321197674
040 _aDLC
_cDLC
_dDLC
042 _apcc
050 0 0 _aTK 5105.59
_b.G86 2004
082 0 0 _aCSFr 005.8
_bG86 2004
100 1 _aGupta, Ajay.
_99744
245 1 0 _aDefend I.T. : security by example /
_cAjay Gupta, Scott Laliberte.
246 3 0 _aDefend IT, security by example
246 1 4 _aSecurity by example, defend I.T.
260 _aBoston :
_bAddison-Wesley,
_c2004.
300 _a349 pages :
_billustration ;
_c24 cm.
504 _aIncludes bibliographical references (p. 321-326) and index.
650 0 _aComputer networks
_xSecurity measures.
_99745
650 0 _aComputer security.
_99722
700 1 _aLaliberte, Scott.
_99746
856 4 1 _3Table of contents
_uhttp://www.loc.gov/catdir/toc/ecip0415/2004004424.html
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2lcc
_cBK
999 _c14330
_d14330