UNIX system security tools

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Ross Seth T.
Μορφή: Βιβλίο
Γλώσσα:English
Έκδοση: McGraw-Hill

MARC

LEADER 00000nam a2200000 i 4500
001 1/13935
010 |a 0-07-913788-1 
035 |l 10008596 
100 |a 20000404d2000 0grey0105 ba 
101 0 |a eng 
200 1 |a UNIX system security tools  |f Seth T. Ross 
210 |a New York  |c McGraw-Hill  |d c2000 
215 |a xviii, 444 p.  |c fig., tabl.  |d 23 cm.  |e 1 CD 
320 |a Bibliography : p.431-435 
320 |a Includes index 
606 0 |a Ασφάλεια υπολογιστών 
606 0 |a Computer security 
606 0 |a Διασφάλιση υπολογιστή 
606 0 |a Υπολογιστές  |x Δίκτυα  |x Μέτρα ασφαλείας 
606 0 |a Πρωτόκολλα δικτύου υπολογιστή 
606 0 |a UNIX  
615 |a ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) 
676 |a 005.43 
700 1 |a Ross  |b Seth T. 
709 |a McGraw-Hill 
801 0 |a GR  |b ΠΑ.Δ.Α. Βιβλιοθήκη Πανεπιστημιούπολης 2  |g AACR2 
852 |a INST  |b LIBRARY  |e 20000404  |h 005.43 ROS  |p 000013107  |q 000013107  |t BK  |y 0  |z 2 
852 |a INST  |b LIBRARY  |e 20000404  |h 005.43 ROS  |p 000013110  |q 000013110  |t BK  |y 23  |z 1 
909 |b 019767 (c.1) 
909 |b 019768 (c.2) 
960 |a ΑΠΡΙΛΙΟΣ 2000 

Εγγραφή στο Ευρετήριο Αναζήτησης

_version_ 1780545236447002624
author Ross Seth T.
author_facet Ross Seth T.
author_role
author_sort Ross Seth T.
author_variant r s t rst
building Campus Library II
collection LIB2 Catalog
dewey-full 005.43
dewey-hundreds 000
dewey-ones 005
dewey-raw 005.43
dewey-search 005.43
dewey-sort 15.43
dewey-tens 000
format Book
fullrecord {"leader":"01242nam a2200337 i 4500","fields":[{"001":"1/13935"},{"010":{"subfields":[{"a":"0-07-913788-1"}],"ind1":" ","ind2":" "}},{"035":{"subfields":[{"l":"10008596"}],"ind1":" ","ind2":" "}},{"100":{"subfields":[{"a":"20000404d2000 0grey0105 ba"}],"ind1":" ","ind2":" "}},{"101":{"subfields":[{"a":"eng"}],"ind1":"0","ind2":" "}},{"200":{"subfields":[{"a":"UNIX system security tools"},{"f":"Seth T. Ross"}],"ind1":"1","ind2":" "}},{"210":{"subfields":[{"a":"New York"},{"c":"McGraw-Hill"},{"d":"c2000"}],"ind1":" ","ind2":" "}},{"215":{"subfields":[{"a":"xviii, 444 p."},{"c":"fig., tabl."},{"d":"23 cm."},{"e":"1 CD"}],"ind1":" ","ind2":" "}},{"320":{"subfields":[{"a":"Bibliography : p.431-435"}],"ind1":" ","ind2":" "}},{"320":{"subfields":[{"a":"Includes index"}],"ind1":" ","ind2":" "}},{"606":{"subfields":[{"a":"\u0391\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1 \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ce\u03bd"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"Computer security"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u0394\u03b9\u03b1\u03c3\u03c6\u03ac\u03bb\u03b9\u03c3\u03b7 \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ae"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u03a5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ad\u03c2"},{"x":"\u0394\u03af\u03ba\u03c4\u03c5\u03b1"},{"x":"\u039c\u03ad\u03c4\u03c1\u03b1 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u03a0\u03c1\u03c9\u03c4\u03cc\u03ba\u03bf\u03bb\u03bb\u03b1 \u03b4\u03b9\u03ba\u03c4\u03cd\u03bf\u03c5 \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ae"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"UNIX "}],"ind1":"0","ind2":" "}},{"615":{"subfields":[{"a":"\u0395\u03a0\u0399\u03a3\u03a4\u0397\u039c\u0397 \u03a5\u03a0\u039f\u039b\u039f\u0393\u0399\u03a3\u03a4\u0397 (SOFTWARE)"}],"ind1":" ","ind2":" "}},{"676":{"subfields":[{"a":"005.43"}],"ind1":" ","ind2":" "}},{"700":{"subfields":[{"a":"Ross"},{"b":"Seth T."}],"ind1":" ","ind2":"1"}},{"709":{"subfields":[{"a":"McGraw-Hill"}],"ind1":" ","ind2":" "}},{"801":{"subfields":[{"a":"GR"},{"b":"\u03a0\u0391.\u0394.\u0391. \u0392\u03b9\u03b2\u03bb\u03b9\u03bf\u03b8\u03ae\u03ba\u03b7 \u03a0\u03b1\u03bd\u03b5\u03c0\u03b9\u03c3\u03c4\u03b7\u03bc\u03b9\u03bf\u03cd\u03c0\u03bf\u03bb\u03b7\u03c2 2"},{"g":"AACR2"}],"ind1":" ","ind2":"0"}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20000404"},{"h":"005.43 ROS"},{"p":"000013107"},{"q":"000013107"},{"t":"BK"},{"y":"0"},{"z":"2"}],"ind1":" ","ind2":" "}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20000404"},{"h":"005.43 ROS"},{"p":"000013110"},{"q":"000013110"},{"t":"BK"},{"y":"23"},{"z":"1"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"019767 (c.1)"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"019768 (c.2)"}],"ind1":" ","ind2":" "}},{"960":{"subfields":[{"a":"\u0391\u03a0\u03a1\u0399\u039b\u0399\u039f\u03a3 2000"}],"ind1":" ","ind2":" "}}]}
id lib2_1/13935
illustrated Illustrated
institution University of West Attica
isbn 0-07-913788-1
language English
physical xviii, 444 p. fig., tabl. 23 cm. 1 CD
publishDate 2000
publisher McGraw-Hill
record_format marc
spelling 20000404d2000 0grey0105 ba
eng
UNIX system security tools Seth T. Ross
New York McGraw-Hill c2000
xviii, 444 p. fig., tabl. 23 cm. 1 CD
Bibliography : p.431-435
Includes index
Ασφάλεια υπολογιστών
Computer security
Διασφάλιση υπολογιστή
Υπολογιστές Δίκτυα Μέτρα ασφαλείας
Πρωτόκολλα δικτύου υπολογιστή
UNIX
ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE)
005.43
Ross Seth T.
McGraw-Hill
GR ΠΑ.Δ.Α. Βιβλιοθήκη Πανεπιστημιούπολης 2 AACR2
INST LIBRARY 20000404 005.43 ROS 000013107 000013107 BK 0 2
INST LIBRARY 20000404 005.43 ROS 000013110 000013110 BK 23 1
spellingShingle Ross Seth T.
UNIX system security tools
Ασφάλεια υπολογιστών
Computer security
Διασφάλιση υπολογιστή
Υπολογιστές Δίκτυα Μέτρα ασφαλείας
Πρωτόκολλα δικτύου υπολογιστή
UNIX
ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE)
title UNIX system security tools
title_auth UNIX system security tools
title_full UNIX system security tools Seth T. Ross
title_fullStr UNIX system security tools Seth T. Ross
title_full_unstemmed UNIX system security tools Seth T. Ross
title_short UNIX system security tools
topic Ασφάλεια υπολογιστών
Computer security
Διασφάλιση υπολογιστή
Υπολογιστές Δίκτυα Μέτρα ασφαλείας
Πρωτόκολλα δικτύου υπολογιστή
UNIX
ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE)
topic_facet Ασφάλεια υπολογιστών
Computer security
Διασφάλιση υπολογιστή
Υπολογιστές Δίκτυα Μέτρα ασφαλείας
Πρωτόκολλα δικτύου υπολογιστή
UNIX