Cargando…

IBM i5/OS network security scenarios : a practical approach /

This IBM℗ʼ Redbooks publication provides specific setup information for various scenarios of Internet security. Assuming readers have knowledge of the theories and conceptual parts of the related topics, this book aims to assist i5/OS network security administrators who need to set up any of the sce...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: International Business Machines Corporation. International Technical Support Organization
Otros Autores: Barlen, Thomas
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Poughkeepsie, NY] : International Business Machines Corporation, 2007.
Edición:1st ed.
Colección:IBM redbooks.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn795702406
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 120618s2007 nyua ob 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d C6I  |d DEBSZ  |d OCLCQ  |d OCLCA  |d OCLCQ  |d OCLCO  |d OCLCF  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCA  |d CEF  |d OCLCA  |d WYU  |d OCLCO  |d ORMDA  |d OCLCQ  |d ORMDA  |d OCLCO 
019 |a 1062932062  |a 1351507789 
020 |z 9780738488998 
020 |z 0738488992 
029 1 |a DEBSZ  |b 370593103 
029 1 |a GBVCP  |b 725766298 
029 1 |a AU@  |b 000057229466 
035 |a (OCoLC)795702406  |z (OCoLC)1062932062  |z (OCoLC)1351507789 
037 |a CL0500000144  |b Safari Books Online 
037 |a 0738488992  |b O'Reilly Media 
050 4 |a QA76.9.A25  |b I22 2007 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
245 0 0 |a IBM i5/OS network security scenarios :  |b a practical approach /  |c Thomas Barlen [and others]. 
250 |a 1st ed. 
260 |a [Poughkeepsie, NY] :  |b International Business Machines Corporation,  |c 2007. 
300 |a 1 online resource (vii-xii, 346 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a IBM redbooks 
588 0 |a Print version record. 
504 |a Includes bibliographical references (pages 337-339) and index. 
520 |a This IBM℗ʼ Redbooks publication provides specific setup information for various scenarios of Internet security. Assuming readers have knowledge of the theories and conceptual parts of the related topics, this book aims to assist i5/OS network security administrators who need to set up any of the scenarios listed in the Table of Contents. Each scenario is a separate chapter. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a i5/OS. 
630 0 7 |a I5/OS.  |2 blmlsh 
630 0 7 |a i5/OS  |2 fast 
650 0 |a Computer security. 
650 0 |a IBM computers  |x Programming. 
650 6 |a Sécurité informatique. 
650 6 |a IBM (Ordinateurs)  |x Programmation. 
650 7 |a Computer security  |2 fast 
650 7 |a IBM computers  |x Programming  |2 fast 
700 1 |a Barlen, Thomas. 
710 2 |a International Business Machines Corporation.  |b International Technical Support Organization. 
776 0 8 |i Print version:  |t IBM i5/OS network security scenarios.  |b 1st ed.  |d [Poughkeepsie, NY] : International Business Machines Corporation, ©2007  |z 9780738488998  |w (DLC) 2009417143  |w (OCoLC)216936369 
830 0 |a IBM redbooks. 
856 4 0 |u https://learning.oreilly.com/library/view/~/0738488992/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP