Record ID | marc_columbia/Columbia-extract-20221130-023.mrc:131639400:1287 |
Source | marc_columbia |
Download Link | /show-records/marc_columbia/Columbia-extract-20221130-023.mrc:131639400:1287?format=raw |
LEADER: 01287cam a2200385 i 4500
001 11358295
005 20150526225113.0
008 131102s2014 inua 001 0 eng d
019 $a862102362
020 $a9780789753250 (paperback)
020 $a0789753251 (paperback)
024 $a99962563785
035 $a(OCoLC)862102143$z(OCoLC)862102362
035 $a(OCoLC)ocn862102143
035 $a(NNC)11358295
040 $aBTCTA$beng$erda$cBTCTA$dYDXCP$dSINLB$dNhCcYBP
050 4 $aQA76.9.A25$bM485 2014
082 04 $a005.8$223
100 1 $aMerkow, Mark S.,$eauthor.
245 10 $aInformation security :$bprinciples and practices /$cMark S. Merkow, Jim Breithaupt.
250 $aSecond edition.
264 1 $aIndianapolis, Indiana :$bPearson,$c[2014]
264 4 $c©2014
300 $axvi, 349 pages :$billustrations ;$c24 cm
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
500 $aIncludes index.
650 0 $aComputer security.
650 0 $aData protection.
650 0 $aComputer networks$xSecurity measures.
650 0 $aInternet$xSecurity measures.
650 0 $aInformation technology$xSecurity measures.
700 1 $aBreithaupt, Jim,$d1955-$eauthor.
852 00 $bsci$hQA76.9.A25$iM485 2014g