|
|
|
|
LEADER |
01944nmm a2200493 u 4500 |
001 |
EB001939685 |
003 |
EBX01000000000000001102587 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 9781788835244
|
050 |
|
4 |
|a HV6773
|
100 |
1 |
|
|a Bautista, Wilson
|
245 |
0 |
0 |
|a Practical cyber intelligence
|b how action-based intelligence can be an effective response to incidents
|c Wilson Bautista Jr
|
260 |
|
|
|a Birmingham, UK
|b Packt Publishing
|c 2018
|
300 |
|
|
|a 1 volume
|b illustrations
|
653 |
|
|
|a Cyberterrorism / Prevention
|
653 |
|
|
|a Data encryption / bicssc
|
653 |
|
|
|a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277
|
653 |
|
|
|a Information technology / Security measures / fast
|
653 |
|
|
|a Computer science / bicssc
|
653 |
|
|
|a Surveillance des menaces informatiques
|
653 |
|
|
|a Computer networks / Security measures / fast
|
653 |
|
|
|a Technologie de l'information / Sécurité / Mesures
|
653 |
|
|
|a Coding theory & cryptology / bicssc
|
653 |
|
|
|a Information technology / Security measures
|
653 |
|
|
|a Réseaux d'ordinateurs / Sécurité / Mesures
|
653 |
|
|
|a Cyber intelligence (Computer security) / fast
|
653 |
|
|
|a Computer crimes / Prevention
|
653 |
|
|
|a Cybernetics & systems theory / bicssc
|
653 |
|
|
|a Cyber intelligence (Computer security) / http://id.loc.gov/authorities/subjects/sh2011005959
|
653 |
|
|
|a Cyberterrorism / Prevention / fast
|
653 |
|
|
|a Computer crimes / Prevention / fast
|
653 |
|
|
|a COMPUTERS / Security / General / bisacsh
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
776 |
|
|
|z 9781788835244
|
776 |
|
|
|z 9781788625562
|
776 |
|
|
|z 1788835247
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781788625562/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 331
|
082 |
0 |
|
|a 500
|
082 |
0 |
|
|a 364.1
|
082 |
0 |
|
|a 005.8
|