|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn859794596 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
131010s2013 mau ob 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d YDXCP
|d IDEBK
|d E7B
|d B24X7
|d STF
|d OCLCO
|d CDX
|d DEBSZ
|d GGVRL
|d COO
|d OCLCQ
|d OCLCF
|d OCLCQ
|d LIV
|d MERUC
|d OCLCQ
|d OCLCA
|d CEF
|d INT
|d AU@
|d OCLCQ
|d VT2
|d NJP
|d BRF
|d LVT
|d TUHNV
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 843332361
|a 961487243
|a 1058546234
|a 1103276426
|a 1114090796
|a 1129349728
|a 1152994369
|a 1192329007
|a 1235841864
|a 1240512418
|a 1243611326
|a 1302280764
|
020 |
|
|
|a 9780124078826
|
020 |
|
|
|a 0124078826
|
020 |
|
|
|z 9780124114838
|
020 |
|
|
|z 0124114830
|
020 |
0 |
|
|a 9781299591974
|q (online)
|
020 |
|
|
|a 1299591973
|
029 |
1 |
|
|a AU@
|b 000052162189
|
029 |
1 |
|
|a AU@
|b 000053294281
|
029 |
1 |
|
|a CHNEW
|b 000723044
|
029 |
1 |
|
|a DEBBG
|b BV041433009
|
029 |
1 |
|
|a DEBSZ
|b 398289654
|
029 |
1 |
|
|a DEBSZ
|b 431307873
|
029 |
1 |
|
|a GBVCP
|b 785373217
|
029 |
1 |
|
|a DKDLA
|b 820120-katalog:9910110212005765
|
035 |
|
|
|a (OCoLC)859794596
|z (OCoLC)843332361
|z (OCoLC)961487243
|z (OCoLC)1058546234
|z (OCoLC)1103276426
|z (OCoLC)1114090796
|z (OCoLC)1129349728
|z (OCoLC)1152994369
|z (OCoLC)1192329007
|z (OCoLC)1235841864
|z (OCoLC)1240512418
|z (OCoLC)1243611326
|z (OCoLC)1302280764
|
037 |
|
|
|a CL0500000316
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|b L684 2013
|
082 |
0 |
4 |
|a 005.8/2
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Loshin, Peter.
|
245 |
1 |
0 |
|a Simple steps to data encryption :
|b a practical guide to secure computing /
|c Peter Loshin.
|
260 |
|
|
|a Waltham, MA :
|b Syngress,
|c 2013.
|
300 |
|
|
|a 1 online resource (1 volume)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed Oct. 7, 2013).
|
504 |
|
|
|a Includes bibliographical references.
|
505 |
0 |
|
|a Chapter 1. Using gnu privacy guard -- chapter 2. Selected FAQs on using GnuPG -- chapter 3. Public keys -- chapter 4. Public key functions -- chapter 5. More about signatures -- chapter 6. Working with public keys -- chapter 7. Editing and revoking a public key -- chapter 8. Security practices and tips.
|
520 |
|
|
|a Provides simple descriptions of actual data threat scenarios alongside step-by-step instructions for securing it. Demonstrates how to use open source, time-proven and peer-reviewed cryptographic software, and gives easy to follow tips for safer computing, as well as unbiased and platform-independent coverage of encryption tools and techniques.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Chiffrement (Informatique)
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Loshin, Peter.
|t Simple steps to data encryption.
|d Waltham, MA : Syngress, 2013
|z 0124114830
|z 9780124114838
|w (OCoLC)832314183
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780124114838/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00054046
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 25451609
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10698612
|
938 |
|
|
|a Cengage Learning
|b GVRL
|n GVRL8ARJ
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis25451609
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 10708734
|
994 |
|
|
|a 92
|b IZTAP
|