Record ID | harvard_bibliographic_metadata/ab.bib.13.20150123.full.mrc:381919324:1202 |
Source | harvard_bibliographic_metadata |
Download Link | /show-records/harvard_bibliographic_metadata/ab.bib.13.20150123.full.mrc:381919324:1202?format=raw |
LEADER: 01202nam a2200313Ia 4500
001 013335843-7
005 20120824020738.0
008 120806s2009 maua b 001 0 eng d
020 $a9780080879352
020 $a0080879357
020 $a9781597493055 (pbk.)
035 0 $aocn804835856
040 $aUMI$cUMI$dMH
090 $aQA76.9.A25$bV57 2009
245 00 $aVirtualization for security :$bincluding sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /$cAaron Bawcom ... [et al.] ; John Hoopes, technical editor.
260 $aBurlington, MA :$bSyngress Pub.,$cc2009.
300 $a1 online resource (xix, 357 p.) :$bill.
588 $aDescription based on print version record.
504 $aIncludes bibliographical references and index.
650 0 $aComputer security.
650 0 $aVirtual storage (Computer science)$xSecurity measures.
650 0 $aVirtual computer systems$xSecurity measures.
650 0 $aComputer networks$xSecurity measures.
650 0 $aWireless communication systems$xSecurity measures.
650 0 $aFirewalls (Computer security)
700 1 $aBawcom, Aaron.
700 1 $aHoopes, John.
988 $a20120824
906 $0OCLC