|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn183318239 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
071211s2008 njua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d OCLCG
|d OCLCQ
|d TXJ
|d CEF
|d OCLCQ
|d NHM
|d DEBSZ
|d OCLCQ
|d OCLCO
|d OCLCF
|d OCLCQ
|d IDEBK
|d OCLCQ
|d YDX
|d N$T
|d IVU
|d OCLCA
|d OCLCQ
|d WYU
|d VT2
|d RDF
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 666883116
|a 1005481585
|a 1005691971
|a 1065067271
|a 1103252651
|a 1129332814
|a 1153051875
|
020 |
|
|
|a 9780132797542
|q (electronic bk.)
|
020 |
|
|
|a 0132797542
|q (electronic bk.)
|
020 |
|
|
|z 9780321434838
|
020 |
|
|
|z 0321434838
|
029 |
1 |
|
|a AU@
|b 000051472225
|
029 |
1 |
|
|a DEBSZ
|b 355404087
|
029 |
1 |
|
|a HEBIS
|b 291476856
|
029 |
1 |
|
|a AU@
|b 000073550928
|
035 |
|
|
|a (OCoLC)183318239
|z (OCoLC)666883116
|z (OCoLC)1005481585
|z (OCoLC)1005691971
|z (OCoLC)1065067271
|z (OCoLC)1103252651
|z (OCoLC)1129332814
|z (OCoLC)1153051875
|
037 |
|
|
|a CL0500000016
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|b S6527 2008
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Smith, Sean W.,
|d 1964-
|
245 |
1 |
4 |
|a The craft of system security /
|c Sean Smith, John Marchesini.
|
260 |
|
|
|a Upper Saddle River, N.J. :
|b Addison-Wesley,
|c ©2008.
|
300 |
|
|
|a 1 online resource (xxxiii, 557 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a pt. I. History -- 1. Introduction -- 2. The Old Testament -- 3. Old Principles, New World -- pt. II. Security and the Modern Computing Landscape -- 4. OS Security -- 5. Network Security -- 6. Implementation Security -- pt. III. Building Blocks for Secure Systems -- 7. Using Cryptography -- 8. Subverting Cryptography -- 9. Authentication -- 10. Public Key Infrastructure -- 11. Standards, Compliance, and Testing -- pt. IV. Applications -- 12. The Web and Security -- 13. Office Tools and Security -- 14. Money, Time, Property -- pt. V. Emerging Tools -- 15. Formal Methods and Security -- 16. Hardware-Based Security -- 17. In Search of the Evil Bit -- 18. Human Issues -- The Take-Home Lesson -- A Exiled Theory.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a System design.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Conception de systèmes.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security.
|2 blmlsh
|
650 |
|
7 |
|a System design.
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a System design.
|2 fast
|0 (OCoLC)fst01141401
|
700 |
1 |
|
|a Marchesini, John.
|
776 |
0 |
8 |
|i Print version:
|a Smith, Sean W., 1964-
|t Craft of system security.
|d Upper Saddle River, NJ : Addison-Wesley, ©2008
|z 9780321434838
|w (DLC) 2007032843
|w (OCoLC)163614129
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780321434838/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1545946
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 264865
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14858273
|
994 |
|
|
|a 92
|b IZTAP
|