|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
OR_ocn243599955 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr zn||||||||| |
008 |
070811s2007 inua ob 001 0 eng d |
010 |
|
|
|a 2007020135
|
040 |
|
|
|a SFB
|b eng
|e pn
|c SFB
|d UMI
|d CEF
|d OCLCQ
|d U5D
|d NHM
|d B24X7
|d DEBSZ
|d OCLCQ
|d OCLCO
|d OCLCA
|d OCLCF
|d OCLCQ
|d LIV
|d OCLCQ
|d OCLCO
|d OCLCA
|d COO
|d WYU
|d UAB
|d VT2
|d LDP
|d HS0
|d INARC
|d OCLCO
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBA716225
|2 bnb
|
016 |
7 |
|
|a 013683384
|2 Uk
|
019 |
|
|
|a 243599956
|a 319837128
|a 606037752
|a 1044619080
|a 1056322661
|a 1064103557
|a 1073055430
|a 1129344099
|a 1152977939
|a 1156850946
|a 1180301611
|a 1192341636
|a 1240519927
|a 1302543346
|
020 |
|
|
|a 9780470101551
|
020 |
|
|
|a 0470101555
|
029 |
1 |
|
|a AU@
|b 000053225959
|
029 |
1 |
|
|a CHBIS
|b 006150160
|
029 |
1 |
|
|a DEBSZ
|b 355411024
|
029 |
1 |
|
|a HEBIS
|b 29148347X
|
029 |
1 |
|
|a AU@
|b 000067105677
|
035 |
|
|
|a (OCoLC)243599955
|z (OCoLC)243599956
|z (OCoLC)319837128
|z (OCoLC)606037752
|z (OCoLC)1044619080
|z (OCoLC)1056322661
|z (OCoLC)1064103557
|z (OCoLC)1073055430
|z (OCoLC)1129344099
|z (OCoLC)1152977939
|z (OCoLC)1156850946
|z (OCoLC)1180301611
|z (OCoLC)1192341636
|z (OCoLC)1240519927
|z (OCoLC)1302543346
|
037 |
|
|
|a CL0500000040
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|b G777 2007eb
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Grimes, Roger A.
|
245 |
1 |
0 |
|a Windows Vista security :
|b securing Vista against malicious attacks /
|c Roger A. Grimes, Jesper M. Johansson.
|
260 |
|
|
|a Indianapolis, Ind. :
|b Wiley Technology Pub.,
|c ©2007.
|
300 |
|
|
|a 1 online resource (xli, 559 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a pt. I. Introducing Windows Vista -- 1. New security features -- 2. How hackers attack -- 3. Windows infrastructure -- pt. II. Host-based security -- 4. User account control -- 5. Managing access control -- 6. Application security -- 7. Vista client protection -- pt. III. Securing Internet and e-mail access -- 8. Securing Internet Explorer -- 9. Introducing IIS7 -- 10. Protecting e-mail -- pt. IV. Securing Windows networks -- 11. Managing Windows firewall -- 12. Server and domain isolation -- 13. Wireless security -- pt. V. Group policy and best practices -- 14. Using group policy -- 15. Thinking about security -- App. A. Building a Windows PE boot disk.
|
546 |
|
|
|a English.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Microsoft Windows (Computer file)
|
630 |
0 |
7 |
|a Microsoft Windows (Computer file)
|2 blmlsh
|
630 |
0 |
7 |
|a Microsoft Windows (Computer file)
|2 fast
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer security.
|2 blmlsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Engineering & Applied Sciences.
|2 hilcc
|
650 |
|
7 |
|a Computer Science.
|2 hilcc
|
700 |
1 |
|
|a Johansson, Jesper M.
|4 aut
|
776 |
|
|
|z 0-470-10155-5
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780470101551/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00020579
|
938 |
|
|
|a Internet Archive
|b INAR
|n windowsvistasecu0000grim
|
994 |
|
|
|a 92
|b IZTAP
|