Web security A step-by-step reference guide
Κύριος συγγραφέας: | |
---|---|
Μορφή: | Βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Addison-Wesley
|
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | 1/5554 | ||
010 | |a 0-201-63489-9 | ||
035 | |l 10011894 | ||
100 | |a 20010122d1998 0grey0105 ba | ||
101 | 0 | |a eng | |
200 | 1 | |a Web security |e A step-by-step reference guide |f Lincoln D. Stein | |
210 | |a Reading |c Addison-Wesley |d c1998 | ||
215 | |a x, 436 p. |c fig., tabl. |d 23 cm. | ||
320 | |a Bibliography : p.421-422 | ||
320 | |a Includes index | ||
606 | 0 | |a Ασφάλεια υπολογιστών | |
606 | 0 | |a Ηλεκτρονικοί υπολογιστές |x Ελεγχος προσπέλασης | |
606 | 0 | |a Υπολογιστές |x Δίκτυα |x Μέτρα ασφαλείας | |
606 | 0 | |a World Wide Web |x Μέτρα ασφαλείας | |
606 | 0 | |a Ιστότοποι |x Μέτρα ασφαλείας | |
615 | |a ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) | ||
676 | |a 005.8 | ||
700 | 1 | |a Stein |b Lincoln D. | |
709 | |a Addison-Wesley | ||
801 | 0 | |a GR |b ΠΑ.Δ.Α. - Βιβλιοθήκη Πανεπιστημιούπολης 2 |g AACR2 | |
852 | |a INST |b LIBRARY |e 20010122 |h 005.8 STE |p 000025734 |q 000025734 |t BK |y 23 |z 1 | ||
852 | |a INST |b LIBRARY |e 20010122 |h 005.8 STE |p 000025735 |q 000025735 |t BK |y 0 |z 2 | ||
909 | |b 024584 (c.1) | ||
909 | |b 024585 (c.2) | ||
960 | |a ΙΑΝΟΥΑΡΙΟΣ 2001 |
Εγγραφή στο Ευρετήριο Αναζήτησης
_version_ | 1780545243023671296 |
---|---|
author | Stein Lincoln D. |
author_facet | Stein Lincoln D. |
author_role | |
author_sort | Stein Lincoln D. |
author_variant | s l d sld |
building | Campus Library II |
collection | LIB2 Catalog |
dewey-full | 005.8 |
dewey-hundreds | 000 |
dewey-ones | 005 |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 |
format | Book |
fullrecord | {"leader":"01309nam a2200325 i 4500","fields":[{"001":"1/5554"},{"010":{"subfields":[{"a":"0-201-63489-9"}],"ind1":" ","ind2":" "}},{"035":{"subfields":[{"l":"10011894"}],"ind1":" ","ind2":" "}},{"100":{"subfields":[{"a":"20010122d1998 0grey0105 ba"}],"ind1":" ","ind2":" "}},{"101":{"subfields":[{"a":"eng"}],"ind1":"0","ind2":" "}},{"200":{"subfields":[{"a":"Web security"},{"e":"A step-by-step reference guide"},{"f":"Lincoln D. Stein"}],"ind1":"1","ind2":" "}},{"210":{"subfields":[{"a":"Reading"},{"c":"Addison-Wesley"},{"d":"c1998"}],"ind1":" ","ind2":" "}},{"215":{"subfields":[{"a":"x, 436 p."},{"c":"fig., tabl."},{"d":"23 cm."}],"ind1":" ","ind2":" "}},{"320":{"subfields":[{"a":"Bibliography : p.421-422"}],"ind1":" ","ind2":" "}},{"320":{"subfields":[{"a":"Includes index"}],"ind1":" ","ind2":" "}},{"606":{"subfields":[{"a":"\u0391\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1 \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ce\u03bd"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u0397\u03bb\u03b5\u03ba\u03c4\u03c1\u03bf\u03bd\u03b9\u03ba\u03bf\u03af \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ad\u03c2"},{"x":"\u0395\u03bb\u03b5\u03b3\u03c7\u03bf\u03c2 \u03c0\u03c1\u03bf\u03c3\u03c0\u03ad\u03bb\u03b1\u03c3\u03b7\u03c2"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u03a5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ad\u03c2"},{"x":"\u0394\u03af\u03ba\u03c4\u03c5\u03b1"},{"x":"\u039c\u03ad\u03c4\u03c1\u03b1 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"World Wide Web"},{"x":"\u039c\u03ad\u03c4\u03c1\u03b1 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u0399\u03c3\u03c4\u03cc\u03c4\u03bf\u03c0\u03bf\u03b9"},{"x":"\u039c\u03ad\u03c4\u03c1\u03b1 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2"}],"ind1":"0","ind2":" "}},{"615":{"subfields":[{"a":"\u0395\u03a0\u0399\u03a3\u03a4\u0397\u039c\u0397 \u03a5\u03a0\u039f\u039b\u039f\u0393\u0399\u03a3\u03a4\u0397 (SOFTWARE)"}],"ind1":" ","ind2":" "}},{"676":{"subfields":[{"a":"005.8"}],"ind1":" ","ind2":" "}},{"700":{"subfields":[{"a":"Stein"},{"b":"Lincoln D."}],"ind1":" ","ind2":"1"}},{"709":{"subfields":[{"a":"Addison-Wesley"}],"ind1":" ","ind2":" "}},{"801":{"subfields":[{"a":"GR"},{"b":"\u03a0\u0391.\u0394.\u0391. - \u0392\u03b9\u03b2\u03bb\u03b9\u03bf\u03b8\u03ae\u03ba\u03b7 \u03a0\u03b1\u03bd\u03b5\u03c0\u03b9\u03c3\u03c4\u03b7\u03bc\u03b9\u03bf\u03cd\u03c0\u03bf\u03bb\u03b7\u03c2 2"},{"g":"AACR2"}],"ind1":" ","ind2":"0"}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20010122"},{"h":"005.8 STE"},{"p":"000025734"},{"q":"000025734"},{"t":"BK"},{"y":"23"},{"z":"1"}],"ind1":" ","ind2":" "}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20010122"},{"h":"005.8 STE"},{"p":"000025735"},{"q":"000025735"},{"t":"BK"},{"y":"0"},{"z":"2"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"024584 (c.1)"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"024585 (c.2)"}],"ind1":" ","ind2":" "}},{"960":{"subfields":[{"a":"\u0399\u0391\u039d\u039f\u03a5\u0391\u03a1\u0399\u039f\u03a3 2001"}],"ind1":" ","ind2":" "}}]}
|
id | lib2_1/5554 |
illustrated | Illustrated |
institution | University of West Attica |
isbn | 0-201-63489-9 |
language | English |
physical | x, 436 p. fig., tabl. 23 cm. |
publishDate | 1998 |
publisher | Addison-Wesley |
record_format | marc |
spelling | 20010122d1998 0grey0105 ba eng Web security A step-by-step reference guide Lincoln D. Stein Reading Addison-Wesley c1998 x, 436 p. fig., tabl. 23 cm. Bibliography : p.421-422 Includes index Ασφάλεια υπολογιστών Ηλεκτρονικοί υπολογιστές Ελεγχος προσπέλασης Υπολογιστές Δίκτυα Μέτρα ασφαλείας World Wide Web Μέτρα ασφαλείας Ιστότοποι Μέτρα ασφαλείας ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) 005.8 Stein Lincoln D. Addison-Wesley GR ΠΑ.Δ.Α. - Βιβλιοθήκη Πανεπιστημιούπολης 2 AACR2 INST LIBRARY 20010122 005.8 STE 000025734 000025734 BK 23 1 INST LIBRARY 20010122 005.8 STE 000025735 000025735 BK 0 2 |
spellingShingle | Stein Lincoln D. Web security A step-by-step reference guide Ασφάλεια υπολογιστών Ηλεκτρονικοί υπολογιστές Ελεγχος προσπέλασης Υπολογιστές Δίκτυα Μέτρα ασφαλείας World Wide Web Μέτρα ασφαλείας Ιστότοποι Μέτρα ασφαλείας ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) |
title | Web security A step-by-step reference guide |
title_auth | Web security A step-by-step reference guide |
title_full | Web security A step-by-step reference guide Lincoln D. Stein |
title_fullStr | Web security A step-by-step reference guide Lincoln D. Stein |
title_full_unstemmed | Web security A step-by-step reference guide Lincoln D. Stein |
title_short | Web security |
title_sub | A step-by-step reference guide |
topic | Ασφάλεια υπολογιστών Ηλεκτρονικοί υπολογιστές Ελεγχος προσπέλασης Υπολογιστές Δίκτυα Μέτρα ασφαλείας World Wide Web Μέτρα ασφαλείας Ιστότοποι Μέτρα ασφαλείας ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) |
topic_facet | Ασφάλεια υπολογιστών Ηλεκτρονικοί υπολογιστές Ελεγχος προσπέλασης Υπολογιστές Δίκτυα Μέτρα ασφαλείας World Wide Web Μέτρα ασφαλείας Ιστότοποι Μέτρα ασφαλείας |