|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn785829041 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
120416s2012 wau ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d UMI
|d YDXCP
|d COO
|d OCLCQ
|d TEFOD
|d DEBSZ
|d OCLCQ
|d FMG
|d OCLCO
|d DUNPL
|d TEFOD
|d S4S
|d OCLCF
|d TEFOD
|d OCLCQ
|d OCLCA
|d OCLCQ
|d CEF
|d WYU
|d UAB
|d SFB
|d BRF
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 801812949
|a 856990961
|a 1151197081
|a 1179509691
|
020 |
|
|
|a 9780735668812
|q (electronic bk.)
|
020 |
|
|
|a 0735668817
|q (electronic bk.)
|
020 |
|
|
|a 9780735668799
|q (electronic bk.)
|
020 |
|
|
|a 0735668795
|q (electronic bk.)
|
020 |
|
|
|z 9780735668836
|
020 |
|
|
|z 0735668833
|
020 |
|
|
|z 9780735668829
|
020 |
|
|
|z 0735668825
|
024 |
3 |
|
|a 9780735668812
|
029 |
1 |
|
|a AU@
|b 000050013283
|
029 |
1 |
|
|a DEBBG
|b BV040903158
|
029 |
1 |
|
|a DEBSZ
|b 378281410
|
029 |
1 |
|
|a DEBSZ
|b 381370151
|
029 |
1 |
|
|a GBVCP
|b 739992546
|
029 |
1 |
|
|a AU@
|b 000067108941
|
035 |
|
|
|a (OCoLC)785829041
|z (OCoLC)801812949
|z (OCoLC)856990961
|z (OCoLC)1151197081
|z (OCoLC)1179509691
|
037 |
|
|
|a CL0500000155
|b Safari Books Online
|
037 |
|
|
|a 46934F43-2CC7-4D6E-A15B-1AC68969A29E
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Tulloch, Mitch.
|
245 |
1 |
0 |
|a Security and privacy for Microsoft Office 2010 users.
|
260 |
|
|
|a Redmond, Wash. :
|b Microsft Press,
|c ©2012.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references (page 78) and index.
|
520 |
8 |
|
|a Annotation
|b This title is also available as a free eBook. Take controland put the built-in security and privacy features in Microsoft Office to work! Whether downloading documents, publishing a presentation, or collaborating onlinethis guide offers concise, how-to guidance and best practices to help protect your documents and your ideas. Get practical, proactive guidance for using the security and privacy management features in Office 2010 and Office 365Walk through everyday scenarios, and discover everyday techniques that help you take chargeUnderstand common risks and learn best practices you can apply right away.
|
546 |
|
|
|a English.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
7 |
|a Microsoft Office.
|2 blmlsh
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
776 |
0 |
8 |
|i Print version:
|t Security and Privacy for Microsoft Office 2010 Users.
|d Microsoft Pr 2012
|z 9780735668836
|w (OCoLC)781679310
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780735668829/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 442057
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7623077
|
994 |
|
|
|a 92
|b IZTAP
|