|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn434050586 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
090827s2009 caua ob 001 0 eng d |
010 |
|
|
|a 2010275793
|
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d CUS
|d OCLCQ
|d CEF
|d OCLCQ
|d UV0
|d DEBSZ
|d N$T
|d COO
|d YDXCP
|d OCLCQ
|d OCLCF
|d OCLCQ
|d TEFOD
|d E7B
|d OCLCQ
|d TEFOD
|d OCLCQ
|d YDX
|d NRC
|d OCLCQ
|d NTG
|d UAB
|d WYU
|d MERER
|d OCLCQ
|d VT2
|d UKAHL
|d UKBTH
|d OCLCO
|d OCLCQ
|d INARC
|d OCLCO
|
015 |
|
|
|a GBA868263
|2 bnb
|
016 |
7 |
|
|a 014621056
|2 Uk
|
019 |
|
|
|a 429935363
|a 617957987
|a 773206238
|a 861533278
|a 968316820
|a 1044285976
|a 1056384539
|a 1063845476
|a 1103258424
|a 1113055088
|a 1129356180
|a 1153041605
|
020 |
|
|
|a 9780596551285
|q (electronic bk.)
|
020 |
|
|
|a 0596551282
|q (electronic bk.)
|
020 |
|
|
|a 9780596555542
|q (electronic bk.)
|
020 |
|
|
|a 0596555547
|q (electronic bk.)
|
020 |
|
|
|z 9780596801786
|
020 |
|
|
|z 0596801785
|
020 |
|
|
|z 9780596527488
|q (pbk.)
|
020 |
|
|
|z 0596527489
|q (pbk.)
|
024 |
8 |
|
|a 9780596801786
|
029 |
1 |
|
|a AU@
|b 000062567598
|
029 |
1 |
|
|a AU@
|b 000066229919
|
029 |
1 |
|
|a CHBIS
|b 006148647
|
029 |
1 |
|
|a CHVBK
|b 171445430
|
029 |
1 |
|
|a DEBSZ
|b 355422786
|
029 |
1 |
|
|a NZ1
|b 13040028
|
035 |
|
|
|a (OCoLC)434050586
|z (OCoLC)429935363
|z (OCoLC)617957987
|z (OCoLC)773206238
|z (OCoLC)861533278
|z (OCoLC)968316820
|z (OCoLC)1044285976
|z (OCoLC)1056384539
|z (OCoLC)1063845476
|z (OCoLC)1103258424
|z (OCoLC)1113055088
|z (OCoLC)1129356180
|z (OCoLC)1153041605
|
037 |
|
|
|a CL0500000046
|b Safari Books Online
|
037 |
|
|
|a 740F11D7-99CE-4ADE-8109-433728E8BD8A
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a TK5105.59
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Beautiful security /
|c edited by Andy Oram and John Viega.
|
250 |
|
|
|a 1st ed.
|
260 |
|
|
|a Sebastopol, Calif. :
|b O'Reilly,
|c ©2009.
|
300 |
|
|
|a 1 online resource (xv, 281 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
490 |
1 |
|
|a Theory in practice
|
500 |
|
|
|a Title from resource description page (Safari, viewed August 11, 2009).
|
500 |
|
|
|a Includes index.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
0 |
|t Psychological security traps /
|r Peiter "Mudge" Zatko --
|t Wireless networking : fertile ground for social engineering /
|r Jim Stickley --
|t Beautiful security metrics /
|r Elizabeth A. Nichols --
|t The underground economy of security breaches /
|r Chenxi Wang --
|t Beautiful trade : rethinking E-commerce security /
|r Ed Bellis --
|t Securing online advertising : rustlers and sheriffs in the new wild west /
|r Benjamin Edelman --
|t The evolution of PGP's Web of Trust /
|r Phil Zimmermann and Jon Callas --
|t Open source honeyclient : proactive detection of client-side exploits /
|r Kathy Wang --
|t Tomorrow's security cogs and levers /
|r Mark Curphey --
|t Security by design /
|r John McManus --
|t Forcing firms to focus : is secure software in your future? /
|r Jim Routh --
|t Oh no, here come the infosecurity lawyers! /
|r Randy V. Sabett --
|t Beautiful log handling /
|r Anton Chuvakin --
|t Incident detection : finding the other 68% /
|r Grant Geyer and Brian Dunphy --
|t Doing real work without real data /
|r Peter Wayner --
|t Casting spells : PC security theater /
|r Michael Wood and Fernando Francisco.
|
520 |
|
|
|a Leaders in the field of security describe bold and extraordinary projects in securing computer systems. This book is a diverse and though-provoking anthology, like Beautiful Code, that shows the state of a major field through stories and insightful analyses. The authors describe how they arrived at unusual solutions to problems such as writing secure code, designing applications securely, and dealing with modern challenges such as wireless security and Internet challenges. This book will make security a cool topic and get people talking.
|
542 |
|
|
|f Copyright © O'Reilly Media, Inc.
|g 2009
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Sécurité informatique.
|2 eclas
|
650 |
|
7 |
|a Délits informatiques.
|2 eclas
|
650 |
|
7 |
|a Informatique en nuage.
|2 eclas
|
650 |
|
7 |
|a Architecture informatique.
|2 eclas
|
650 |
|
7 |
|a Manuels.
|2 eclas
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
700 |
1 |
|
|a Oram, Andrew.
|
700 |
1 |
|
|a Viega, John.
|
776 |
0 |
8 |
|i Print version:
|t Beautiful security.
|b 1st ed.
|d Sebastopol, CA : Farnham : O'Reilly, 2009
|z 9780596527488
|w (OCoLC)150370629
|
830 |
|
0 |
|a Theory in practice (Sebastopol, Calif.)
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780596801786/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH29298002
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10762101
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 415613
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7407949
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3317204
|
938 |
|
|
|a Internet Archive
|b INAR
|n beautifulsecurit0000unse
|
994 |
|
|
|a 92
|b IZTAP
|