Network security bible:
"Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your side. Covering new techniques, technology, and methods for approaching securit...
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | , |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Indianapolis, Ind.
Wiley Pub.
2009
|
Ausgabe: | 2nd ed. |
Schriftenreihe: | Bible
v. 657 |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780470502495/?ar |
Zusammenfassung: | "Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your side. Covering new techniques, technology, and methods for approaching security, it also examines new trends and best practices being used by many organizations. The revised Network Security Bible complements the Cisco Academy course instruction in networking security"--Resource description page. |
Beschreibung: | Print version record |
Umfang: | 1 Online-Ressource (xliv, 891 Seiten) illustrations |
ISBN: | 0470502495 9780470502495 9780470569993 0470569999 9786612303487 6612303484 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047483687 | ||
003 | DE-627-1 | ||
005 | 20240228114543.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2009 xx |||||o 00| ||eng c | ||
020 | |a 0470502495 |9 0-470-50249-5 | ||
020 | |a 9780470502495 |9 978-0-470-50249-5 | ||
020 | |a 9780470569993 |9 978-0-470-56999-3 | ||
020 | |a 0470569999 |9 0-470-56999-9 | ||
020 | |a 9786612303487 |c electronic bk. |9 9786612303487 | ||
020 | |a 6612303484 |9 6612303484 | ||
020 | |a 9780470502495 |9 978-0-470-50249-5 | ||
035 | |a (DE-627-1)047483687 | ||
035 | |a (DE-599)KEP047483687 | ||
035 | |a (ORHE)9780470502495 | ||
035 | |a (DE-627-1)047483687 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Cole, Eric |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Network security bible |c Eric Cole, Ronald Krutz, James W. Conley |
250 | |a 2nd ed. | ||
264 | 1 | |a Indianapolis, Ind. |b Wiley Pub. |c 2009 | |
300 | |a 1 Online-Ressource (xliv, 891 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Bible |v v. 657 | |
500 | |a Print version record | ||
520 | |a "Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your side. Covering new techniques, technology, and methods for approaching security, it also examines new trends and best practices being used by many organizations. The revised Network Security Bible complements the Cisco Academy course instruction in networking security"--Resource description page. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
700 | 1 | |a Krutz, Ronald L. |d 1938- |e MitwirkendeR |4 ctb | |
700 | 1 | |a Conley, James W. |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9780470502495 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780470502495 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780470502495/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047483687 |
---|---|
_version_ | 1821494896771465216 |
adam_text | |
any_adam_object | |
author | Cole, Eric |
author2 | Krutz, Ronald L. 1938- Conley, James W. |
author2_role | ctb ctb |
author2_variant | r l k rl rlk j w c jw jwc |
author_facet | Cole, Eric Krutz, Ronald L. 1938- Conley, James W. |
author_role | aut |
author_sort | Cole, Eric |
author_variant | e c ec |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047483687 (DE-599)KEP047483687 (ORHE)9780470502495 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2nd ed. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02506cam a22005772 4500</leader><controlfield tag="001">ZDB-30-ORH-047483687</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114543.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2009 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470502495</subfield><subfield code="9">0-470-50249-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470502495</subfield><subfield code="9">978-0-470-50249-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470569993</subfield><subfield code="9">978-0-470-56999-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470569999</subfield><subfield code="9">0-470-56999-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786612303487</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">9786612303487</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6612303484</subfield><subfield code="9">6612303484</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470502495</subfield><subfield code="9">978-0-470-50249-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047483687</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047483687</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780470502495</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047483687</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cole, Eric</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network security bible</subfield><subfield code="c">Eric Cole, Ronald Krutz, James W. Conley</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, Ind.</subfield><subfield code="b">Wiley Pub.</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xliv, 891 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Bible</subfield><subfield code="v">v. 657</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your side. Covering new techniques, technology, and methods for approaching security, it also examines new trends and best practices being used by many organizations. The revised Network Security Bible complements the Cisco Academy course instruction in networking security"--Resource description page.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Krutz, Ronald L.</subfield><subfield code="d">1938-</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Conley, James W.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9780470502495</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780470502495</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780470502495/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047483687 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:40Z |
institution | BVB |
isbn | 0470502495 9780470502495 9780470569993 0470569999 9786612303487 6612303484 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xliv, 891 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Wiley Pub. |
record_format | marc |
series2 | Bible |
spelling | Cole, Eric VerfasserIn aut Network security bible Eric Cole, Ronald Krutz, James W. Conley 2nd ed. Indianapolis, Ind. Wiley Pub. 2009 1 Online-Ressource (xliv, 891 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Bible v. 657 Print version record "Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your side. Covering new techniques, technology, and methods for approaching security, it also examines new trends and best practices being used by many organizations. The revised Network Security Bible complements the Cisco Academy course instruction in networking security"--Resource description page. Computer security Computer networks Security measures Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures Krutz, Ronald L. 1938- MitwirkendeR ctb Conley, James W. MitwirkendeR ctb 9780470502495 Erscheint auch als Druck-Ausgabe 9780470502495 |
spellingShingle | Cole, Eric Network security bible Computer security Computer networks Security measures Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures |
title | Network security bible |
title_auth | Network security bible |
title_exact_search | Network security bible |
title_full | Network security bible Eric Cole, Ronald Krutz, James W. Conley |
title_fullStr | Network security bible Eric Cole, Ronald Krutz, James W. Conley |
title_full_unstemmed | Network security bible Eric Cole, Ronald Krutz, James W. Conley |
title_short | Network security bible |
title_sort | network security bible |
topic | Computer security Computer networks Security measures Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures |
topic_facet | Computer security Computer networks Security measures Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures |
work_keys_str_mv | AT coleeric networksecuritybible AT krutzronaldl networksecuritybible AT conleyjamesw networksecuritybible |