Inside network perimeter security /
Guardado en:
| Formato: | Libro |
|---|---|
| Lenguaje: | Indeterminado |
| Publicado: |
Sams Publishing,
2005
|
| Edición: | 2nd ed. |
| Materias: | |
| Aporte de: | Registro referencial: Solicitar el recurso aquí |
| LEADER | 00532nam a2200181Ia 4500 | ||
|---|---|---|---|
| 008 | 191210s9999||||xx |||||||||||||| ||und|| | ||
| 020 | |a 672327376 | ||
| 040 | |b en. | ||
| 050 | |b I 58 | ||
| 080 | |a 004.7.056 | ||
| 245 | 0 | |a Inside network perimeter security / |c Stephen Northcutt, Lenny Zeltser, Scott Winters, Kent. Karen, Ronald W. Ritchey | |
| 250 | |a 2nd ed. | ||
| 260 | |b Sams Publishing, |c 2005 | ||
| 300 | |b 734 p. ; il. ; |c 23 cm. | ||
| 500 | |a Apéndices: p. 639 a 661 | ||
| 653 | |a RED DE ORDENADORES | ||
| 942 | |c BK | ||
| 999 | |d 8077 |c 8077 | ||