|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn795702406 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
120618s2007 nyua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d C6I
|d DEBSZ
|d OCLCQ
|d OCLCA
|d OCLCQ
|d OCLCO
|d OCLCF
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCA
|d CEF
|d OCLCA
|d WYU
|d OCLCO
|d ORMDA
|d OCLCQ
|d ORMDA
|d OCLCO
|
019 |
|
|
|a 1062932062
|a 1351507789
|
020 |
|
|
|z 9780738488998
|
020 |
|
|
|z 0738488992
|
029 |
1 |
|
|a DEBSZ
|b 370593103
|
029 |
1 |
|
|a GBVCP
|b 725766298
|
029 |
1 |
|
|a AU@
|b 000057229466
|
035 |
|
|
|a (OCoLC)795702406
|z (OCoLC)1062932062
|z (OCoLC)1351507789
|
037 |
|
|
|a CL0500000144
|b Safari Books Online
|
037 |
|
|
|a 0738488992
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.9.A25
|b I22 2007
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a IBM i5/OS network security scenarios :
|b a practical approach /
|c Thomas Barlen [and others].
|
250 |
|
|
|a 1st ed.
|
260 |
|
|
|a [Poughkeepsie, NY] :
|b International Business Machines Corporation,
|c 2007.
|
300 |
|
|
|a 1 online resource (vii-xii, 346 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a IBM redbooks
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references (pages 337-339) and index.
|
520 |
|
|
|a This IBM℗ʼ Redbooks publication provides specific setup information for various scenarios of Internet security. Assuming readers have knowledge of the theories and conceptual parts of the related topics, this book aims to assist i5/OS network security administrators who need to set up any of the scenarios listed in the Table of Contents. Each scenario is a separate chapter.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a i5/OS.
|
630 |
0 |
7 |
|a I5/OS.
|2 blmlsh
|
630 |
0 |
7 |
|a i5/OS
|2 fast
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a IBM computers
|x Programming.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a IBM (Ordinateurs)
|x Programmation.
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a IBM computers
|x Programming
|2 fast
|
700 |
1 |
|
|a Barlen, Thomas.
|
710 |
2 |
|
|a International Business Machines Corporation.
|b International Technical Support Organization.
|
776 |
0 |
8 |
|i Print version:
|t IBM i5/OS network security scenarios.
|b 1st ed.
|d [Poughkeepsie, NY] : International Business Machines Corporation, ©2007
|z 9780738488998
|w (DLC) 2009417143
|w (OCoLC)216936369
|
830 |
|
0 |
|a IBM redbooks.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/0738488992/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|