Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Erscheinungsort nicht ermittelbar]
Que
2002
|
Ausgabe: | 4th edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/0672324598/?ar |
Zusammenfassung: | Maximum Security, Fourth Edition provides updated, comprehensive, platform-by-platform coverage of security issues, and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. This book provides information for security administrators and others interested in computer and network security and provides them with techniques to take steps to protect their systems. |
Umfang: | 1 online resource (976 pages) |
ISBN: | 0672324598 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047347554 | ||
003 | DE-627-1 | ||
005 | 20240228120719.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2002 xx |||||o 00| ||eng c | ||
020 | |a 0672324598 |9 0-672-32459-8 | ||
035 | |a (DE-627-1)047347554 | ||
035 | |a (DE-599)KEP047347554 | ||
035 | |a (ORHE)0672324598 | ||
035 | |a (DE-627-1)047347554 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 21 | |
100 | 0 | |a Anonymous |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Maximum Security, Fourth Edition |c Anonymous |
250 | |a 4th edition. | ||
264 | 1 | |a [Erscheinungsort nicht ermittelbar] |b Que |c 2002 | |
300 | |a 1 online resource (976 pages) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Maximum Security, Fourth Edition provides updated, comprehensive, platform-by-platform coverage of security issues, and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. This book provides information for security administrators and others interested in computer and network security and provides them with techniques to take steps to protect their systems. | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer security | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/0672324598/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047347554 |
---|---|
_version_ | 1833357122863104001 |
adam_text | |
any_adam_object | |
author | Anonymous |
author_facet | Anonymous |
author_role | aut |
author_sort | Anonymous |
author_variant | a |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047347554 (DE-599)KEP047347554 (ORHE)0672324598 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 4th edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01719cam a22004092c 4500</leader><controlfield tag="001">ZDB-30-ORH-047347554</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120719.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2002 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0672324598</subfield><subfield code="9">0-672-32459-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047347554</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047347554</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)0672324598</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047347554</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Anonymous</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Maximum Security, Fourth Edition</subfield><subfield code="c">Anonymous</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">4th edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Erscheinungsort nicht ermittelbar]</subfield><subfield code="b">Que</subfield><subfield code="c">2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (976 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Maximum Security, Fourth Edition provides updated, comprehensive, platform-by-platform coverage of security issues, and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. This book provides information for security administrators and others interested in computer and network security and provides them with techniques to take steps to protect their systems.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/0672324598/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047347554 |
illustrated | Not Illustrated |
indexdate | 2025-05-28T09:46:40Z |
institution | BVB |
isbn | 0672324598 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (976 pages) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Que |
record_format | marc |
spelling | Anonymous VerfasserIn aut Maximum Security, Fourth Edition Anonymous 4th edition. [Erscheinungsort nicht ermittelbar] Que 2002 1 online resource (976 pages) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Maximum Security, Fourth Edition provides updated, comprehensive, platform-by-platform coverage of security issues, and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. This book provides information for security administrators and others interested in computer and network security and provides them with techniques to take steps to protect their systems. Computer networks Security measures Computer security Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures |
spellingShingle | Anonymous Maximum Security, Fourth Edition Computer networks Security measures Computer security Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures |
title | Maximum Security, Fourth Edition |
title_auth | Maximum Security, Fourth Edition |
title_exact_search | Maximum Security, Fourth Edition |
title_full | Maximum Security, Fourth Edition Anonymous |
title_fullStr | Maximum Security, Fourth Edition Anonymous |
title_full_unstemmed | Maximum Security, Fourth Edition Anonymous |
title_short | Maximum Security, Fourth Edition |
title_sort | maximum security fourth edition |
topic | Computer networks Security measures Computer security Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures |
topic_facet | Computer networks Security measures Computer security Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures |
work_keys_str_mv | AT anonymous maximumsecurityfourthedition |