|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_ocn900639754 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
150123s2015 njua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d COO
|d DEBBG
|d OCLCQ
|d YDX
|d N$T
|d OCLCA
|d LND
|d CEF
|d OCLCQ
|d INT
|d OCLCQ
|d CSA
|d SFB
|d MM9
|d UKAHL
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1005307746
|a 1013594632
|a 1013853167
|a 1043064179
|a 1151186273
|
020 |
|
|
|a 9780134078564
|q (electronic bk.)
|
020 |
|
|
|a 013407856X
|q (electronic bk.)
|
020 |
|
|
|a 0134085043
|
020 |
|
|
|a 9780134085043
|
020 |
|
|
|z 9780134085074
|
020 |
|
|
|z 0134085078
|
020 |
|
|
|z 0134085043
|
020 |
|
|
|z 0134085094
|
020 |
|
|
|z 9780134085098
|
020 |
|
|
|z 9780134085043
|
020 |
|
|
|z 013407856X
|
020 |
|
|
|a 0134085051
|
020 |
|
|
|a 9780134085050
|
024 |
3 |
|
|a 9780134085043
|
029 |
1 |
|
|a AU@
|b 000057233884
|
029 |
1 |
|
|a DEBBG
|b BV042490362
|
029 |
1 |
|
|a DEBSZ
|b 434835412
|
029 |
1 |
|
|a GBVCP
|b 882738186
|
035 |
|
|
|a (OCoLC)900639754
|z (OCoLC)1005307746
|z (OCoLC)1013594632
|z (OCoLC)1013853167
|z (OCoLC)1043064179
|z (OCoLC)1151186273
|
037 |
|
|
|a CL0500000537
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Pfleeger, Charles P.,
|d 1948-
|e author.
|
245 |
1 |
0 |
|a Security in computing /
|c Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies.
|
250 |
|
|
|a Fifth edition.
|
264 |
|
1 |
|a Upper Saddle River, NJ :
|b Prentice Hall,
|c [2015]
|
264 |
|
4 |
|c ©2015
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
546 |
|
|
|a English.
|
505 |
0 |
|
|a Introduction -- Toolbox : authentication, access control, and cryptography -- Programs and programming -- The Web : user side -- Operating systems -- Networks -- Databases -- Cloud computing -- Privacy -- Management and incidents -- Legal issues and ethics -- Details of cryptography -- Emerging topics.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Privacy, Right of.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
650 |
|
7 |
|a Privacy, Right of
|2 fast
|
700 |
1 |
|
|a Pfleeger, Shari Lawrence,
|e author.
|
700 |
1 |
|
|a Margulies, Jonathan,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Pfleeger, Charles P., 1948-
|t Security in computing.
|b Fifth edition.
|d Upper Saddle River, NJ : Prentice Hall, [2015]
|z 9780134085043
|w (DLC) 2014038579
|w (OCoLC)893452682
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780134085074/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH28174662
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1601045
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14856363
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15012202
|
994 |
|
|
|a 92
|b IZTAP
|