UNIX system security tools
Κύριος συγγραφέας: | |
---|---|
Μορφή: | Βιβλίο |
Γλώσσα: | English |
Έκδοση: |
McGraw-Hill
|
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | 1/13935 | ||
010 | |a 0-07-913788-1 | ||
035 | |l 10008596 | ||
100 | |a 20000404d2000 0grey0105 ba | ||
101 | 0 | |a eng | |
200 | 1 | |a UNIX system security tools |f Seth T. Ross | |
210 | |a New York |c McGraw-Hill |d c2000 | ||
215 | |a xviii, 444 p. |c fig., tabl. |d 23 cm. |e 1 CD | ||
320 | |a Bibliography : p.431-435 | ||
320 | |a Includes index | ||
606 | 0 | |a Ασφάλεια υπολογιστών | |
606 | 0 | |a Computer security | |
606 | 0 | |a Διασφάλιση υπολογιστή | |
606 | 0 | |a Υπολογιστές |x Δίκτυα |x Μέτρα ασφαλείας | |
606 | 0 | |a Πρωτόκολλα δικτύου υπολογιστή | |
606 | 0 | |a UNIX | |
615 | |a ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) | ||
676 | |a 005.43 | ||
700 | 1 | |a Ross |b Seth T. | |
709 | |a McGraw-Hill | ||
801 | 0 | |a GR |b ΠΑ.Δ.Α. Βιβλιοθήκη Πανεπιστημιούπολης 2 |g AACR2 | |
852 | |a INST |b LIBRARY |e 20000404 |h 005.43 ROS |p 000013107 |q 000013107 |t BK |y 0 |z 2 | ||
852 | |a INST |b LIBRARY |e 20000404 |h 005.43 ROS |p 000013110 |q 000013110 |t BK |y 23 |z 1 | ||
909 | |b 019767 (c.1) | ||
909 | |b 019768 (c.2) | ||
960 | |a ΑΠΡΙΛΙΟΣ 2000 |
Εγγραφή στο Ευρετήριο Αναζήτησης
_version_ | 1780545236447002624 |
---|---|
author | Ross Seth T. |
author_facet | Ross Seth T. |
author_role | |
author_sort | Ross Seth T. |
author_variant | r s t rst |
building | Campus Library II |
collection | LIB2 Catalog |
dewey-full | 005.43 |
dewey-hundreds | 000 |
dewey-ones | 005 |
dewey-raw | 005.43 |
dewey-search | 005.43 |
dewey-sort | 15.43 |
dewey-tens | 000 |
format | Book |
fullrecord | {"leader":"01242nam a2200337 i 4500","fields":[{"001":"1/13935"},{"010":{"subfields":[{"a":"0-07-913788-1"}],"ind1":" ","ind2":" "}},{"035":{"subfields":[{"l":"10008596"}],"ind1":" ","ind2":" "}},{"100":{"subfields":[{"a":"20000404d2000 0grey0105 ba"}],"ind1":" ","ind2":" "}},{"101":{"subfields":[{"a":"eng"}],"ind1":"0","ind2":" "}},{"200":{"subfields":[{"a":"UNIX system security tools"},{"f":"Seth T. Ross"}],"ind1":"1","ind2":" "}},{"210":{"subfields":[{"a":"New York"},{"c":"McGraw-Hill"},{"d":"c2000"}],"ind1":" ","ind2":" "}},{"215":{"subfields":[{"a":"xviii, 444 p."},{"c":"fig., tabl."},{"d":"23 cm."},{"e":"1 CD"}],"ind1":" ","ind2":" "}},{"320":{"subfields":[{"a":"Bibliography : p.431-435"}],"ind1":" ","ind2":" "}},{"320":{"subfields":[{"a":"Includes index"}],"ind1":" ","ind2":" "}},{"606":{"subfields":[{"a":"\u0391\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1 \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ce\u03bd"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"Computer security"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u0394\u03b9\u03b1\u03c3\u03c6\u03ac\u03bb\u03b9\u03c3\u03b7 \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ae"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u03a5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ad\u03c2"},{"x":"\u0394\u03af\u03ba\u03c4\u03c5\u03b1"},{"x":"\u039c\u03ad\u03c4\u03c1\u03b1 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u03a0\u03c1\u03c9\u03c4\u03cc\u03ba\u03bf\u03bb\u03bb\u03b1 \u03b4\u03b9\u03ba\u03c4\u03cd\u03bf\u03c5 \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ae"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"UNIX "}],"ind1":"0","ind2":" "}},{"615":{"subfields":[{"a":"\u0395\u03a0\u0399\u03a3\u03a4\u0397\u039c\u0397 \u03a5\u03a0\u039f\u039b\u039f\u0393\u0399\u03a3\u03a4\u0397 (SOFTWARE)"}],"ind1":" ","ind2":" "}},{"676":{"subfields":[{"a":"005.43"}],"ind1":" ","ind2":" "}},{"700":{"subfields":[{"a":"Ross"},{"b":"Seth T."}],"ind1":" ","ind2":"1"}},{"709":{"subfields":[{"a":"McGraw-Hill"}],"ind1":" ","ind2":" "}},{"801":{"subfields":[{"a":"GR"},{"b":"\u03a0\u0391.\u0394.\u0391. \u0392\u03b9\u03b2\u03bb\u03b9\u03bf\u03b8\u03ae\u03ba\u03b7 \u03a0\u03b1\u03bd\u03b5\u03c0\u03b9\u03c3\u03c4\u03b7\u03bc\u03b9\u03bf\u03cd\u03c0\u03bf\u03bb\u03b7\u03c2 2"},{"g":"AACR2"}],"ind1":" ","ind2":"0"}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20000404"},{"h":"005.43 ROS"},{"p":"000013107"},{"q":"000013107"},{"t":"BK"},{"y":"0"},{"z":"2"}],"ind1":" ","ind2":" "}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20000404"},{"h":"005.43 ROS"},{"p":"000013110"},{"q":"000013110"},{"t":"BK"},{"y":"23"},{"z":"1"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"019767 (c.1)"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"019768 (c.2)"}],"ind1":" ","ind2":" "}},{"960":{"subfields":[{"a":"\u0391\u03a0\u03a1\u0399\u039b\u0399\u039f\u03a3 2000"}],"ind1":" ","ind2":" "}}]}
|
id | lib2_1/13935 |
illustrated | Illustrated |
institution | University of West Attica |
isbn | 0-07-913788-1 |
language | English |
physical | xviii, 444 p. fig., tabl. 23 cm. 1 CD |
publishDate | 2000 |
publisher | McGraw-Hill |
record_format | marc |
spelling | 20000404d2000 0grey0105 ba eng UNIX system security tools Seth T. Ross New York McGraw-Hill c2000 xviii, 444 p. fig., tabl. 23 cm. 1 CD Bibliography : p.431-435 Includes index Ασφάλεια υπολογιστών Computer security Διασφάλιση υπολογιστή Υπολογιστές Δίκτυα Μέτρα ασφαλείας Πρωτόκολλα δικτύου υπολογιστή UNIX ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) 005.43 Ross Seth T. McGraw-Hill GR ΠΑ.Δ.Α. Βιβλιοθήκη Πανεπιστημιούπολης 2 AACR2 INST LIBRARY 20000404 005.43 ROS 000013107 000013107 BK 0 2 INST LIBRARY 20000404 005.43 ROS 000013110 000013110 BK 23 1 |
spellingShingle | Ross Seth T. UNIX system security tools Ασφάλεια υπολογιστών Computer security Διασφάλιση υπολογιστή Υπολογιστές Δίκτυα Μέτρα ασφαλείας Πρωτόκολλα δικτύου υπολογιστή UNIX ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) |
title | UNIX system security tools |
title_auth | UNIX system security tools |
title_full | UNIX system security tools Seth T. Ross |
title_fullStr | UNIX system security tools Seth T. Ross |
title_full_unstemmed | UNIX system security tools Seth T. Ross |
title_short | UNIX system security tools |
topic | Ασφάλεια υπολογιστών Computer security Διασφάλιση υπολογιστή Υπολογιστές Δίκτυα Μέτρα ασφαλείας Πρωτόκολλα δικτύου υπολογιστή UNIX ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) |
topic_facet | Ασφάλεια υπολογιστών Computer security Διασφάλιση υπολογιστή Υπολογιστές Δίκτυα Μέτρα ασφαλείας Πρωτόκολλα δικτύου υπολογιστή UNIX |