000 | 01093pam a22002894a 4500 | ||
---|---|---|---|
001 | 66 | ||
003 | BD-DhEU | ||
005 | 20120513154323.0 | ||
008 | 120514s2005 inua 001 0 eng | ||
020 | _a0764573977 (pbk.) | ||
040 |
_aDLC _cDLC _dYDX _dDLC _dBD-DhEU |
||
082 | 0 | 0 |
_a005.8 _222 _bCON 2005 |
100 | 1 |
_aCole, Eric. _9456 |
|
245 | 1 | 0 |
_aNetwork security bible / _cEric Cole, Ronald Krutz, and James W. Conley. |
260 |
_aIndianapolis, IN : _bWiley Pub., _cc2005. |
||
300 |
_axxxiv, 660 p. : _bill. ; _c24 cm. |
||
500 | _aIncludes index. | ||
590 | _aMd. Jahangir Alam | ||
650 | 0 |
_aComputer security. _9446 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _9457 |
|
700 | 1 |
_aKrutz, Ronald L., _d1938- _9458 |
|
700 | 1 |
_aConley, James W. _9459 |
|
856 | 4 | 1 |
_3Table of contents only _uhttp://www.loc.gov/catdir/toc/ecip053/2004025696.html |
856 | 4 | 2 |
_3Contributor biographical information _uhttp://www.loc.gov/catdir/enhancements/fy0617/2004025696-b.html |
856 | 4 | 2 |
_3Publisher description _uhttp://www.loc.gov/catdir/enhancements/fy0617/2004025696-d.html |
942 |
_2ddc _cBK |
||
999 |
_c138 _d138 |