It looks like you're offline.
Open Library logo
additional options menu

MARC Record from Library of Congress

Record ID marc_loc_2016/BooksAll.2016.part36.utf8:159168332:1246
Source Library of Congress
Download Link /show-records/marc_loc_2016/BooksAll.2016.part36.utf8:159168332:1246?format=raw

LEADER: 01246cam a2200265 a 4500
001 2009052077
003 DLC
005 20100724090027.0
008 100106s2010 maua b 001 0 eng
010 $a 2009052077
015 $aGBB040101$2bnb
016 7 $a015511578$2Uk
020 $a9781597495356 (alk. paper)
020 $a1597495352 (alk. paper)
035 $a(OCoLC)ocn491935695
040 $aDLC$cDLC$dYDX$dBTCTA$dYDXCP$dUKM$dCDX$dDLC
050 00 $aTK5105.59$b.N48 2010
082 00 $a005.8$222
245 00 $aNetwork and system security /$ceditor, John R. Vacca.
260 $aBurlington, MA :$bSyngress/Elsevier,$cc2010.
300 $axxxv, 368 p. :$bill. ;$c24 cm.
504 $aIncludes bibliographical references and index.
505 0 $aBuilding a secure organization -- A cryptography primer -- Preventing system intrusions -- Guarding against network intrusions -- Unix and Linux security -- Eliminating the security weakness of Linux and Unix operating systems -- Internet security -- The botnet problem -- Intranet security -- Local area network security -- Wireless network security -- Cellular network security -- Radio frequency identification security.
650 0 $aComputer networks$xSecurity measures.
700 1 $aVacca, John R.