|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn865474324 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
131216s2014 maua ob 001 0 eng d |
010 |
|
|
|a 2014469390
|
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d COO
|d DEBBG
|d GGVRL
|d DEBSZ
|d VT2
|d OCLCQ
|d OCLCF
|d OCLCQ
|d LIV
|d OCLCQ
|d U3W
|d CEF
|d OCLCQ
|d WYU
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 880598647
|a 889288758
|a 1055329673
|a 1065920922
|a 1081232784
|a 1103257711
|a 1129363906
|
020 |
|
|
|a 9780124166950
|
020 |
|
|
|a 0124166954
|
020 |
|
|
|a 012416689X
|
020 |
|
|
|a 9780124166899
|
020 |
|
|
|z 9780124166899
|
029 |
1 |
|
|a AU@
|b 000052404235
|
029 |
1 |
|
|a AU@
|b 000053305475
|
029 |
1 |
|
|a DEBBG
|b BV041777988
|
029 |
1 |
|
|a DEBSZ
|b 404324606
|
029 |
1 |
|
|a GBVCP
|b 88272181X
|
035 |
|
|
|a (OCoLC)865474324
|z (OCoLC)880598647
|z (OCoLC)889288758
|z (OCoLC)1055329673
|z (OCoLC)1065920922
|z (OCoLC)1081232784
|z (OCoLC)1103257711
|z (OCoLC)1129363906
|
037 |
|
|
|a CL0500000349
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.59
|b .N48 2014
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Network and system security /
|c edited by John R. Vacca.
|
250 |
|
|
|a 2nd ed.
|
260 |
|
|
|a Waltham, MA :
|b Syngress,
|c 2014.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed Dec. 5, 2013).
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a 1. Detecting system intrusions / Almantas Kakareka -- 2. Preventing system intrusions / Michael West -- 3. Guarding against network intrusions / Thomas M. Chen and Patrick J. Walsh -- 4. Securing cloud computing systems / Cem Gurkok -- 5. Unix and Linux security / Gerald Beuchelt -- 6. Eliminating the security weakness of Linux and Unix operating systems / Mario Santana -- 7. Internet security / Jesse Walker -- 8. Intranet security / Bill Mansoor -- 9. Local area network security / Dr. Pramod Pandya -- 10. Wireless network security / Chunming Rong [and four others] -- 11. Cellular network security / Peng Liu, Thomas F. Laporta and Kameswari Kotapati -- 12. RFID security / Chunming Rong [and four others] -- 13. Optical wireless security / Scott R. Ellis.
|
520 |
|
|
|a This book provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
700 |
1 |
|
|a Vacca, John R.
|
776 |
0 |
8 |
|i Print version:
|t Network and system security.
|b 2nd ed.
|d Waltham, MA : Syngress, 2014
|w (DLC) 2014469390
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780124166899/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Cengage Learning
|b GVRL
|n GVRL8DRO
|
994 |
|
|
|a 92
|b IZTAP
|