|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBSCO_ocm52383196 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
030606s2001 vau ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d OCLCQ
|d YDXCP
|d OCLCQ
|d OCLCF
|d OCLCO
|d OCLCQ
|d SLY
|d CSL
|d OCLCQ
|d AGLDB
|d OCLCA
|d OCLCQ
|d VTS
|d INT
|d OCLCQ
|d STF
|d M8D
|d JX9
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 82975998
|a 880326692
|a 961677058
|a 962642968
|
020 |
|
|
|a 058544997X
|q (electronic bk.)
|
020 |
|
|
|a 9780585449975
|q (electronic bk.)
|
020 |
|
|
|a 9781878707963
|q (electronic bk.)
|
020 |
|
|
|a 1878707965
|q (electronic bk.)
|
029 |
1 |
|
|a DEBBG
|b BV043090881
|
029 |
1 |
|
|a DEBSZ
|b 422432156
|
029 |
1 |
|
|a GBVCP
|b 801025761
|
035 |
|
|
|a (OCoLC)52383196
|z (OCoLC)82975998
|z (OCoLC)880326692
|z (OCoLC)961677058
|z (OCoLC)962642968
|
050 |
|
4 |
|a QA76.9.A25
|b S744 2001eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 21
|
084 |
|
|
|a TP309
|2 clc
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Stefanek, George L.
|
245 |
1 |
0 |
|a Information security best practices :
|b 200 basic rules /
|c by George L. Stefanek.
|
260 |
|
|
|a Eagle Rock, Va. :
|b LLH Technology Pub.,
|c ©2001.
|
300 |
|
|
|a 1 online resource (ix, 112 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references (pages 107-109).
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
0 |
7 |
|a Computer security.
|2 cct
|
650 |
0 |
7 |
|a Computer networks
|x Security measures.
|2 cct
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
776 |
0 |
8 |
|i Print version:
|a Stefanek, George L.
|t Information security best practices.
|d Eagle Rock, Va. : LLH Technology Pub., ©2001
|z 1878707965
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=81836
|z Texto completo
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 81836
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2333236
|
994 |
|
|
|a 92
|b IZTAP
|