|
|
|
|
LEADER |
01323pam a2200361 a 4500 |
001 |
181-013301747 |
003 |
Uk |
005 |
20060411162135.0 |
008 |
050707s2005 inua b 001 0 eng |
007 |
tu |
010 |
|
|
|a 2005902139
|
015 |
|
|
|a GBA582320
|2 bnb
|
016 |
7 |
|
|a 013301747
|2 Uk
|
020 |
|
|
|a 0672328097 (pbk.) :
|c £28.99
|
040 |
|
|
|a StDuBDS
|d Uk
|
042 |
|
|
|a ukblsr
|
082 |
0 |
4 |
|a 005.8
|2 22
|
100 |
1 |
|
|a Gregg, Michael
|q (Michael C.)
|
245 |
1 |
0 |
|a Inside network security assessment
|b guarding your IT infrastructure
|c Michael Gregg, David Kim
|
260 |
|
|
|a Indianapolis, Ind
|b SAMS ;
|a London :
|b Pearson Education distributor,
|c 2005
|
300 |
|
|
|a x, 293 p. :
|b ill. ;
|c 23 cm. +
|e 1 CD-ROM.
|
336 |
|
|
|a text
|2 rdacontent
|
337 |
|
|
|a unmediated
|2 rdamedia
|
338 |
|
|
|a volume
|2 rdacarrier
|
500 |
|
|
|a "CD-ROM includes a variety of assessment tools, along with worksheets, checklists and templates"--back cover.
|
504 |
|
|
|a Includes bibliographical references and index.
|
650 |
|
0 |
|a Computer security
|x Evaluation
|x Methodology.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
700 |
1 |
|
|a Kim, David
|d 1976-
|
852 |
1 |
1 |
|a British Library
|b STI
|k (B)
|h 005.8
|
866 |
|
0 |
|z Accompanying CD-ROM at (TB) 005.8
|x .
|
852 |
1 |
1 |
|a British Library
|b STI
|k (TB)
|h 005.8
|
980 |
|
|
|a 013301747
|b 181
|c sid-181-col-blfidbbi
|
SOLR
_version_ |
1778756063289409536 |
access_facet |
Local Holdings |
author |
Gregg, Michael |
author2 |
Kim, David |
author2_role |
|
author2_variant |
d k dk |
author_facet |
Gregg, Michael, Kim, David |
author_fuller |
(Michael C.) |
author_role |
|
author_sort |
Gregg, Michael |
author_variant |
m g mg |
building |
Library A |
callnumber-sort |
|
collection |
sid-181-col-blfidbbi |
dewey-full |
005.8 |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-ones |
005 - Computer programming, programs & data |
dewey-raw |
005.8 |
dewey-search |
005.8 |
dewey-sort |
15.8 |
dewey-tens |
000 - Computer science, knowledge & systems |
facet_avail |
Local |
finc_class_facet |
Informatik |
fincclass_txtF_mv |
science-computerscience |
footnote |
"CD-ROM includes a variety of assessment tools, along with worksheets, checklists and templates"--back cover. |
format |
Book |
format_access_txtF_mv |
Book, E-Book |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-print-monograph-independent |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
Book |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
Book |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
id |
181-013301747 |
illustrated |
Illustrated |
imprint |
Indianapolis, Ind, SAMS ;, London :, Pearson Education distributor,, 2005 |
imprint_str_mv |
Indianapolis, Ind SAMS ; London : Pearson Education distributor, 2005 |
institution |
FID-BBI-DE-23 |
is_hierarchy_id |
|
is_hierarchy_title |
|
isbn |
0672328097 (pbk.) : |
isil_str_mv |
FID-BBI-DE-23 |
language |
English |
last_indexed |
2023-10-03T17:26:12.024Z |
lccn |
2005902139 |
match_str |
gregg2005insidenetworksecurityassessmentguardingyouritinfrastructure |
mega_collection |
British Library Catalogue |
physical |
x, 293 p.; ill; 23 cm. +; 1 CD-ROM |
publishDate |
2005 |
publishDateSort |
2005 |
publishPlace |
Indianapolis, Ind |
publisher |
SAMS ; |
record_format |
marcfinc |
record_id |
013301747 |
recordtype |
marcfinc |
rvk_facet |
No subject assigned |
source_id |
181 |
spelling |
Gregg, Michael (Michael C.), Inside network security assessment guarding your IT infrastructure Michael Gregg, David Kim, Indianapolis, Ind SAMS ; London : Pearson Education distributor, 2005, x, 293 p. : ill. ; 23 cm. + 1 CD-ROM., text rdacontent, unmediated rdamedia, volume rdacarrier, "CD-ROM includes a variety of assessment tools, along with worksheets, checklists and templates"--back cover., Includes bibliographical references and index., Computer security Evaluation Methodology., Computer networks Security measures., Kim, David 1976-, British Library STI (B) 005.8, Accompanying CD-ROM at (TB) 005.8 ., British Library STI (TB) 005.8 |
spellingShingle |
Gregg, Michael, Inside network security assessment: guarding your IT infrastructure, Computer security Evaluation Methodology., Computer networks Security measures. |
title |
Inside network security assessment: guarding your IT infrastructure |
title_auth |
Inside network security assessment guarding your IT infrastructure |
title_full |
Inside network security assessment guarding your IT infrastructure Michael Gregg, David Kim |
title_fullStr |
Inside network security assessment guarding your IT infrastructure Michael Gregg, David Kim |
title_full_unstemmed |
Inside network security assessment guarding your IT infrastructure Michael Gregg, David Kim |
title_short |
Inside network security assessment |
title_sort |
inside network security assessment guarding your it infrastructure |
title_sub |
guarding your IT infrastructure |
topic |
Computer security Evaluation Methodology., Computer networks Security measures. |
topic_facet |
Computer security, Computer networks, Evaluation, Methodology., Security measures. |