Network intrusion prevention design guide:
Gespeichert in:
Körperschaft: | |
---|---|
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Poughkeepsie, N.Y.?]
IBM, International Technical Support Organization
2011
|
Schriftenreihe: | Redbooks
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/0738436216/?ar |
Beschreibung: | Includes bibliographical references and index |
Umfang: | 1 Online-Ressource (xiv, 258 Seiten) illustrations. |
ISBN: | 0738436216 9780738436210 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-051697696 | ||
003 | DE-627-1 | ||
005 | 20240228114941.0 | ||
007 | cr uuu---uuuuu | ||
008 | 200417s2011 xx |||||o 00| ||eng c | ||
020 | |a 0738436216 |9 0-7384-3621-6 | ||
020 | |a 9780738436210 |9 978-0-7384-3621-0 | ||
035 | |a (DE-627-1)051697696 | ||
035 | |a (DE-599)KEP051697696 | ||
035 | |a (ORHE)0738436216 | ||
035 | |a (DE-627-1)051697696 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23 | |
245 | 1 | 0 | |a Network intrusion prevention design guide |c Axel Buecker [and others] |
264 | 1 | |a [Poughkeepsie, N.Y.?] |b IBM, International Technical Support Organization |c 2011 | |
300 | |a 1 Online-Ressource (xiv, 258 Seiten) |b illustrations. | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Redbooks | |
500 | |a Includes bibliographical references and index | ||
650 | 0 | |a Business enterprises |x Computer networks |x Security measures | |
650 | 0 | |a Computer networks |x Access control | |
650 | 0 | |a Computer security | |
650 | 0 | |a IBM computers |x Security measures | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Business enterprises ; Computer networks ; Security measures | |
650 | 4 | |a Computer networks ; Access control | |
650 | 4 | |a Computer security | |
650 | 4 | |a IBM computers ; Security measures | |
700 | 1 | |a Bücker, Axel |e MitwirkendeR |4 ctb | |
710 | 2 | |a International Business Machines Corporation. |b International Technical Support Organization. |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9780738436210 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780738436210 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/0738436216/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-051697696 |
---|---|
_version_ | 1821494841849151488 |
adam_text | |
any_adam_object | |
author2 | Bücker, Axel |
author2_role | ctb |
author2_variant | a b ab |
author_corporate | International Business Machines Corporation. International Technical Support Organization |
author_corporate_role | ctb |
author_facet | Bücker, Axel International Business Machines Corporation. International Technical Support Organization |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)051697696 (DE-599)KEP051697696 (ORHE)0738436216 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01918cam a22005052 4500</leader><controlfield tag="001">ZDB-30-ORH-051697696</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114941.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">200417s2011 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0738436216</subfield><subfield code="9">0-7384-3621-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780738436210</subfield><subfield code="9">978-0-7384-3621-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051697696</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP051697696</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)0738436216</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051697696</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network intrusion prevention design guide</subfield><subfield code="c">Axel Buecker [and others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Poughkeepsie, N.Y.?]</subfield><subfield code="b">IBM, International Technical Support Organization</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xiv, 258 Seiten)</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Redbooks</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">IBM computers</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises ; Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IBM computers ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bücker, Axel</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">International Business Machines Corporation.</subfield><subfield code="b">International Technical Support Organization.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9780738436210</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780738436210</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/0738436216/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-051697696 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:48Z |
institution | BVB |
isbn | 0738436216 9780738436210 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xiv, 258 Seiten) illustrations. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | IBM, International Technical Support Organization |
record_format | marc |
series2 | Redbooks |
spelling | Network intrusion prevention design guide Axel Buecker [and others] [Poughkeepsie, N.Y.?] IBM, International Technical Support Organization 2011 1 Online-Ressource (xiv, 258 Seiten) illustrations. Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Redbooks Includes bibliographical references and index Business enterprises Computer networks Security measures Computer networks Access control Computer security IBM computers Security measures Computer Security Sécurité informatique Business enterprises ; Computer networks ; Security measures Computer networks ; Access control IBM computers ; Security measures Bücker, Axel MitwirkendeR ctb International Business Machines Corporation. International Technical Support Organization. MitwirkendeR ctb 9780738436210 Erscheint auch als Druck-Ausgabe 9780738436210 |
spellingShingle | Network intrusion prevention design guide Business enterprises Computer networks Security measures Computer networks Access control Computer security IBM computers Security measures Computer Security Sécurité informatique Business enterprises ; Computer networks ; Security measures Computer networks ; Access control IBM computers ; Security measures |
title | Network intrusion prevention design guide |
title_auth | Network intrusion prevention design guide |
title_exact_search | Network intrusion prevention design guide |
title_full | Network intrusion prevention design guide Axel Buecker [and others] |
title_fullStr | Network intrusion prevention design guide Axel Buecker [and others] |
title_full_unstemmed | Network intrusion prevention design guide Axel Buecker [and others] |
title_short | Network intrusion prevention design guide |
title_sort | network intrusion prevention design guide |
topic | Business enterprises Computer networks Security measures Computer networks Access control Computer security IBM computers Security measures Computer Security Sécurité informatique Business enterprises ; Computer networks ; Security measures Computer networks ; Access control IBM computers ; Security measures |
topic_facet | Business enterprises Computer networks Security measures Computer networks Access control Computer security IBM computers Security measures Computer Security Sécurité informatique Business enterprises ; Computer networks ; Security measures Computer networks ; Access control IBM computers ; Security measures |
work_keys_str_mv | AT buckeraxel networkintrusionpreventiondesignguide AT internationalbusinessmachinescorporationinternationaltechnicalsupportorganization networkintrusionpreventiondesignguide |