|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
OR_on1113810658 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
100602s2010 flua o 000 0 eng d |
040 |
|
|
|a UHL
|b eng
|e pn
|c UHL
|d OCLCO
|d NLE
|d OCLCF
|d OCLCQ
|d UKAHL
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 992448791
|
020 |
|
|
|a 1439827346
|
020 |
|
|
|a 9781439827345
|
029 |
1 |
|
|a AU@
|b 000066261394
|
035 |
|
|
|a (OCoLC)1113810658
|z (OCoLC)992448791
|
037 |
|
|
|a TANDF_214378
|b Ingram Content Group
|
082 |
0 |
4 |
|a 658.478
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Stackpole, Bill.
|0 http://viaf.org/viaf/sourceID/LC%7cn2007046244
|
245 |
1 |
0 |
|a Security strategy :
|b from requirements to reality /
|c Bill Stackpole and Eric Oksendahl.
|
260 |
|
|
|a Boca Raton, Fla. :
|b Auerbach ;
|a London :
|b Taylor & Francis [distributor],
|c 2010.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Business enterprises
|x Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security
|x Management.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
6 |
|a Sécurité informatique
|x Gestion.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
7 |
|a Business enterprises
|x Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00842535
|
650 |
|
7 |
|a Computer security
|x Management.
|2 fast
|0 (OCoLC)fst00872493
|
650 |
|
7 |
|a Data protection.
|2 fast
|0 (OCoLC)fst00887958
|
700 |
1 |
|
|a Oksendahl, Eric.
|0 http://viaf.org/viaf/sourceID/LC%7cn2010043422
|
776 |
0 |
|
|c Paperback
|z 9781439827338
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781439827345/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH24132593
|
994 |
|
|
|a 92
|b IZTAP
|