|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocm54940045 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
040413s2003 wau ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d OCLCQ
|d YDXCP
|d OCLCG
|d OCLCQ
|d OCLCF
|d N$T
|d OCLCQ
|d PIFBR
|d OCLCQ
|d WY@
|d OCLCA
|d LUE
|d TOF
|d AJS
|d UKAHL
|d OCLCO
|d OCLCQ
|d NTG
|d STF
|d CEF
|d COO
|d B24X7
|d OTZ
|d E7B
|d GO9
|d AU@
|d WYU
|d INARC
|d VT2
|d UKOBU
|
019 |
|
|
|a 54115992
|a 55234786
|a 63111150
|a 748106181
|a 781258663
|a 809687554
|a 1044239521
|a 1056358276
|a 1058669338
|a 1060868243
|a 1062853816
|a 1074285479
|a 1097102029
|a 1192332383
|a 1240512595
|
020 |
|
|
|a 0585486689
|q (electronic bk.)
|
020 |
|
|
|a 9780585486680
|q (electronic bk.)
|
020 |
|
|
|a 9780735635500
|q (e-book)
|
020 |
|
|
|a 0735635501
|q (e-book)
|
020 |
|
|
|z 9780735617223
|q (paperback)
|
020 |
|
|
|z 0735617228
|q (paperback)
|
029 |
1 |
|
|a NZ1
|b 11773752
|
029 |
1 |
|
|a AU@
|b 000073179884
|
029 |
1 |
|
|a HEBIS
|b 291427146
|
035 |
|
|
|a (OCoLC)54940045
|z (OCoLC)54115992
|z (OCoLC)55234786
|z (OCoLC)63111150
|z (OCoLC)748106181
|z (OCoLC)781258663
|z (OCoLC)809687554
|z (OCoLC)1044239521
|z (OCoLC)1056358276
|z (OCoLC)1058669338
|z (OCoLC)1060868243
|z (OCoLC)1062853816
|z (OCoLC)1074285479
|z (OCoLC)1097102029
|z (OCoLC)1192332383
|z (OCoLC)1240512595
|
050 |
|
4 |
|a QA76.9.A25
|b H698 2003eb
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Howard, Michael,
|d 1965-
|
245 |
1 |
0 |
|a Writing secure code :
|b practical strategies and proven techniques for building secure applications in a networked world /
|c Michael Howard and David LeBlanc.
|
250 |
|
|
|a 2nd ed.
|
260 |
|
|
|a Redmond, Wash. :
|b Microsoft Press,
|c ©2003.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Best practices
|
500 |
|
|
|a "Microsoft 2."
|
504 |
|
|
|a Includes bibliographical references and index.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Chiffrement (Informatique)
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|0 (OCoLC)fst00887935
|
700 |
1 |
|
|a LeBlanc, David,
|d 1960-
|
776 |
0 |
8 |
|i Print version:
|a Howard, Michael, 1965-
|t Writing secure code.
|b 2nd ed.
|d Redmond, Wash. : Microsoft Press, ©2003
|z 0735617228
|w (DLC) 2002035986
|w (OCoLC)50669212
|
830 |
|
0 |
|a Best practices (Redmond, Wash.)
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/0735617228/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26378447
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 92624
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2336473
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 11201840
|
938 |
|
|
|a Internet Archive
|b INAR
|n writingsecucod00howa
|
994 |
|
|
|a 92
|b IZTAP
|