LEADER 02302nmm a2200553 u 4500
001 EB001937408
003 EBX01000000000000001100310
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 1439804842 
020 |a 113658661X 
020 |a 1439883440 
020 |a 9781439804841 
020 |a 9781136586668 
020 |a 9781136586613 
020 |a 1136586652 
020 |a 9781136586651 
020 |a 9781439883440 
050 4 |a QA76.3 
100 1 |a Tipton, Harold F. 
245 0 0 |a Official (ISC)2 guide to the SSCP CBK  |c edited by Harold F. Tipton 
250 |a 2nd ed 
260 |a Boca Raton  |b CRC Press  |c 2011 
300 |a xv, 451 pages  |b illustrations 
505 0 |a 1. Access controls / Paul Henry -- 2. Cryptography / Christopher M. Nowell -- 3. Malicious code / Ken Dunham -- 4. Monitoring and analysis / Mike Mackrill -- 5. Networks and telecommunications / Eric Waxvik and Samuel Chun -- 6. Security operations and administration / C. Karen Stopford -- 7. Risk, response, and recovery / Chris Trautwein 
505 0 |a Includes bibliographical references and index 
653 |a Computer networks / Security measures / Examinations / fast 
653 |a Computer security / Examinations / Study guides 
653 |a Computer networks / Security measures / Examinations / Study guides 
653 |a Electronic data processing personnel / Certification / fast 
653 |a Telecommunications engineers / Certification / fast 
653 |a Electronic data processing personnel / Certification 
653 |a Computer security / Examinations / fast 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures / Examens / Guides de l'étudiant 
653 |a Telecommunications engineers / Certification 
653 |a Sécurité informatique / Examens / Guides de l'étudiant 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
490 0 |a (ISC)2 press series 
500 |a "Security transcends technology.". - "An Auerbach book." 
024 8 |a 10.1201/b10388 
776 |z 9781439883440 
776 |z 9781439804834 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781439804841/?ar  |x Verlag  |3 Volltext 
082 0 |a 005.8 
082 0 |a 331 
082 0 |a 384 
082 0 |a 374