LEADER 01764nmm a2200481 u 4500
001 EB001916956
003 EBX01000000000000001079858
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 0321197674 
050 4 |a TK5105.59 
100 1 |a Gupta, Ajay 
245 0 0 |a Defend I.T.  |b security by example  |c Ajay Gupta, Scott Laliberte 
246 3 1 |a Defend IT, security by example 
246 3 1 |a Security by example, defend I.T. 
260 |a Boston  |b Addison-Wesley  |c 2004 
300 |a xxviii, 349 pages  |b illustrations 
505 0 |a Includes bibliographical references (pages 321-326) and index 
653 |a Computer security 
653 |a Electrical & Computer Engineering / hilcc 
653 |a Sécurité informatique 
653 |a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277 
653 |a Computer networks / Security measures / fast 
653 |a Telecommunications / hilcc 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures 
653 |a Engineering & Applied Sciences / hilcc 
653 |a Security 
653 |a Computer security / fast 
700 1 |a Laliberte, Scott 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
500 |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002 
776 |z 0321197674 
776 |z 9780321197672 
776 |z 9780321197672 
856 4 0 |u https://learning.oreilly.com/library/view/~/0321197674/?ar  |x Verlag  |3 Volltext 
082 0 |a 384 
082 0 |a 331 
082 0 |a 500 
082 0 |a 620 
082 0 |a 005.8 
520 |a Annotation