Defend I.T: security by example
Annotation
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Boston
Addison-Wesley
2004
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/0321197674/?ar |
Zusammenfassung: | Annotation |
Beschreibung: | Includes bibliographical references (pages 321-326) and index. - Print version record |
Umfang: | 1 Online-Ressource (xxviii, 349 Seiten) illustrations |
Format: | Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |
ISBN: | 0321197674 9780321197672 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047356901 | ||
003 | DE-627-1 | ||
005 | 20240228113923.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2004 xx |||||o 00| ||eng c | ||
020 | |a 0321197674 |9 0-321-19767-4 | ||
020 | |a 9780321197672 |9 978-0-321-19767-2 | ||
020 | |a 0321197674 |9 0-321-19767-4 | ||
035 | |a (DE-627-1)047356901 | ||
035 | |a (DE-599)KEP047356901 | ||
035 | |a (ORHE)0321197674 | ||
035 | |a (DE-627-1)047356901 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Gupta, Ajay |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Defend I.T |b security by example |c Ajay Gupta, Scott Laliberte |
246 | 3 | 3 | |a Defend IT, security by example |
246 | 3 | 3 | |a Security by example, defend I.T. |
264 | 1 | |a Boston |b Addison-Wesley |c 2004 | |
264 | 2 | |a [Erscheinungsort nicht ermittelbar] |b HathiTrust Digital Library | |
300 | |a 1 Online-Ressource (xxviii, 349 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references (pages 321-326) and index. - Print version record | ||
506 | |f Restrictions unspecified |2 star | ||
520 | |a Annotation | ||
538 | |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. | ||
546 | |a English. | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer security | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Electrical & Computer Engineering | |
650 | 4 | |a Engineering & Applied Sciences | |
650 | 4 | |a Telecommunications | |
650 | 4 | |a Security | |
700 | 1 | |a Laliberte, Scott |e MitwirkendeR |4 ctb | |
776 | 1 | |z 0321197674 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 0321197674 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/0321197674/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047356901 |
---|---|
_version_ | 1821494918203310080 |
adam_text | |
any_adam_object | |
author | Gupta, Ajay |
author2 | Laliberte, Scott |
author2_role | ctb |
author2_variant | s l sl |
author_facet | Gupta, Ajay Laliberte, Scott |
author_role | aut |
author_sort | Gupta, Ajay |
author_variant | a g ag |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047356901 (DE-599)KEP047356901 (ORHE)0321197674 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02251cam a22005892 4500</leader><controlfield tag="001">ZDB-30-ORH-047356901</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228113923.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2004 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0321197674</subfield><subfield code="9">0-321-19767-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780321197672</subfield><subfield code="9">978-0-321-19767-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0321197674</subfield><subfield code="9">0-321-19767-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047356901</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047356901</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)0321197674</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047356901</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gupta, Ajay</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Defend I.T</subfield><subfield code="b">security by example</subfield><subfield code="c">Ajay Gupta, Scott Laliberte</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">Defend IT, security by example</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">Security by example, defend I.T.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">2004</subfield></datafield><datafield tag="264" ind1=" " ind2="2"><subfield code="a">[Erscheinungsort nicht ermittelbar]</subfield><subfield code="b">HathiTrust Digital Library</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxviii, 349 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 321-326) and index. - Print version record</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="f">Restrictions unspecified</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Annotation</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electrical & Computer Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering & Applied Sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Laliberte, Scott</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">0321197674</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">0321197674</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/0321197674/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047356901 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:22:00Z |
institution | BVB |
isbn | 0321197674 9780321197672 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxviii, 349 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Addison-Wesley |
record_format | marc |
spelling | Gupta, Ajay VerfasserIn aut Defend I.T security by example Ajay Gupta, Scott Laliberte Defend IT, security by example Security by example, defend I.T. Boston Addison-Wesley 2004 [Erscheinungsort nicht ermittelbar] HathiTrust Digital Library 1 Online-Ressource (xxviii, 349 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references (pages 321-326) and index. - Print version record Restrictions unspecified star Annotation Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. English. Computer networks Security measures Computer security Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures Electrical & Computer Engineering Engineering & Applied Sciences Telecommunications Security Laliberte, Scott MitwirkendeR ctb 0321197674 Erscheint auch als Druck-Ausgabe 0321197674 |
spellingShingle | Gupta, Ajay Defend I.T security by example Computer networks Security measures Computer security Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures Electrical & Computer Engineering Engineering & Applied Sciences Telecommunications Security |
title | Defend I.T security by example |
title_alt | Defend IT, security by example Security by example, defend I.T. |
title_auth | Defend I.T security by example |
title_exact_search | Defend I.T security by example |
title_full | Defend I.T security by example Ajay Gupta, Scott Laliberte |
title_fullStr | Defend I.T security by example Ajay Gupta, Scott Laliberte |
title_full_unstemmed | Defend I.T security by example Ajay Gupta, Scott Laliberte |
title_short | Defend I.T |
title_sort | defend i t security by example |
title_sub | security by example |
topic | Computer networks Security measures Computer security Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures Electrical & Computer Engineering Engineering & Applied Sciences Telecommunications Security |
topic_facet | Computer networks Security measures Computer security Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures Electrical & Computer Engineering Engineering & Applied Sciences Telecommunications Security |
work_keys_str_mv | AT guptaajay defenditsecuritybyexample AT lalibertescott defenditsecuritybyexample AT guptaajay securitybyexampledefendit AT lalibertescott securitybyexampledefendit |