Network securiry essentials Applications and standards
| Main Author: | |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Prentice Hall
|
| Edition: | 2nd ed. |
MARC
| LEADER | 00000nam a2200000 i 4500 | ||
|---|---|---|---|
| 001 | 1/6468 | ||
| 010 | |a 0-13-120271-5 | ||
| 035 | |l 10012359 | ||
| 100 | |a 20031204d2003 0grey0105 ba | ||
| 101 | 0 | |a eng | |
| 200 | 1 | |a Network securiry essentials |e Applications and standards |f William Stallings | |
| 205 | |a 2nd ed. | ||
| 210 | |a Uppper Saddle River |c Prentice Hall |d c2003 | ||
| 215 | |a xv, 409 p. |c fig., tabl. |d 24 cm. | ||
| 320 | |a Bibliography : p.381-387 | ||
| 320 | |a Includes index | ||
| 606 | 0 | |a Ασφάλεια υπολογιστών | |
| 606 | 0 | |a Υπολογιστές |x Δίκτυα |x Μέτρα ασφαλείας | |
| 606 | 0 | |a Διαδίκτυο (Internet) |x Μέτρα ασφαλείας | |
| 606 | 0 | |a Computer security | |
| 606 | 0 | |a Κρυπτογράφηση δεδομένων (Επιστήμη υπολογιστή) | |
| 615 | |a ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) | ||
| 676 | |a 005.8 | ||
| 700 | 1 | |a Stallings |b William | |
| 709 | |a Prentice Hall | ||
| 801 | 0 | |a GR |b ΠΑ.Δ.Α. - Βιβλιοθήκη Πανεπιστημιούπολης 2 |g AACR2 | |
| 852 | |a INST |b LIBRARY |e 20031204 |h 005.8 STA |p 000023088 |q 000023088 |t BK |y 0 |z 2 | ||
| 852 | |a INST |b LIBRARY |e 20031204 |h 005.8 STA |p 000023089 |q 000023089 |t BK |y 23 |z 1 | ||
| 909 | |b 025995 | ||
| 909 | |b 025996 (c.2) | ||
| 960 | |a ΔΕΚΕΜΒΡΙΟΣ 2003 | ||
Record in the Search Index
| _version_ | 1780545243876163584 |
|---|---|
| author | Stallings William |
| author_facet | Stallings William |
| author_role | |
| author_sort | Stallings William |
| author_variant | s w sw |
| building | Campus Library II |
| collection | LIB2 Catalog |
| dewey-full | 005.8 |
| dewey-hundreds | 000 |
| dewey-ones | 005 |
| dewey-raw | 005.8 |
| dewey-search | 005.8 |
| dewey-sort | 15.8 |
| dewey-tens | 000 |
| edition | 2nd ed. |
| format | Book |
| fullrecord | {"leader":"01333nam a2200337 i 4500","fields":[{"001":"1/6468"},{"010":{"subfields":[{"a":"0-13-120271-5"}],"ind1":" ","ind2":" "}},{"035":{"subfields":[{"l":"10012359"}],"ind1":" ","ind2":" "}},{"100":{"subfields":[{"a":"20031204d2003 0grey0105 ba"}],"ind1":" ","ind2":" "}},{"101":{"subfields":[{"a":"eng"}],"ind1":"0","ind2":" "}},{"200":{"subfields":[{"a":"Network securiry essentials"},{"e":"Applications and standards"},{"f":"William Stallings"}],"ind1":"1","ind2":" "}},{"205":{"subfields":[{"a":"2nd ed."}],"ind1":" ","ind2":" "}},{"210":{"subfields":[{"a":"Uppper Saddle River"},{"c":"Prentice Hall"},{"d":"c2003"}],"ind1":" ","ind2":" "}},{"215":{"subfields":[{"a":"xv, 409 p."},{"c":"fig., tabl."},{"d":"24 cm."}],"ind1":" ","ind2":" "}},{"320":{"subfields":[{"a":"Bibliography : p.381-387"}],"ind1":" ","ind2":" "}},{"320":{"subfields":[{"a":"Includes index"}],"ind1":" ","ind2":" "}},{"606":{"subfields":[{"a":"\u0391\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1 \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ce\u03bd"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u03a5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ad\u03c2"},{"x":"\u0394\u03af\u03ba\u03c4\u03c5\u03b1"},{"x":"\u039c\u03ad\u03c4\u03c1\u03b1 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u0394\u03b9\u03b1\u03b4\u03af\u03ba\u03c4\u03c5\u03bf (Internet)"},{"x":"\u039c\u03ad\u03c4\u03c1\u03b1 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"Computer security"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u039a\u03c1\u03c5\u03c0\u03c4\u03bf\u03b3\u03c1\u03ac\u03c6\u03b7\u03c3\u03b7 \u03b4\u03b5\u03b4\u03bf\u03bc\u03ad\u03bd\u03c9\u03bd (\u0395\u03c0\u03b9\u03c3\u03c4\u03ae\u03bc\u03b7 \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ae)"}],"ind1":"0","ind2":" "}},{"615":{"subfields":[{"a":"\u0395\u03a0\u0399\u03a3\u03a4\u0397\u039c\u0397 \u03a5\u03a0\u039f\u039b\u039f\u0393\u0399\u03a3\u03a4\u0397 (SOFTWARE)"}],"ind1":" ","ind2":" "}},{"676":{"subfields":[{"a":"005.8"}],"ind1":" ","ind2":" "}},{"700":{"subfields":[{"a":"Stallings"},{"b":"William"}],"ind1":" ","ind2":"1"}},{"709":{"subfields":[{"a":"Prentice Hall"}],"ind1":" ","ind2":" "}},{"801":{"subfields":[{"a":"GR"},{"b":"\u03a0\u0391.\u0394.\u0391. - \u0392\u03b9\u03b2\u03bb\u03b9\u03bf\u03b8\u03ae\u03ba\u03b7 \u03a0\u03b1\u03bd\u03b5\u03c0\u03b9\u03c3\u03c4\u03b7\u03bc\u03b9\u03bf\u03cd\u03c0\u03bf\u03bb\u03b7\u03c2 2"},{"g":"AACR2"}],"ind1":" ","ind2":"0"}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20031204"},{"h":"005.8 STA"},{"p":"000023088"},{"q":"000023088"},{"t":"BK"},{"y":"0"},{"z":"2"}],"ind1":" ","ind2":" "}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20031204"},{"h":"005.8 STA"},{"p":"000023089"},{"q":"000023089"},{"t":"BK"},{"y":"23"},{"z":"1"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"025995"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"025996 (c.2)"}],"ind1":" ","ind2":" "}},{"960":{"subfields":[{"a":"\u0394\u0395\u039a\u0395\u039c\u0392\u03a1\u0399\u039f\u03a3 2003"}],"ind1":" ","ind2":" "}}]}
|
| id | lib2_1/6468 |
| illustrated | Illustrated |
| institution | University of West Attica |
| isbn | 0-13-120271-5 |
| language | English |
| physical | xv, 409 p. fig., tabl. 24 cm. |
| publishDate | 2003 |
| publisher | Prentice Hall |
| record_format | marc |
| spelling | 20031204d2003 0grey0105 ba eng Network securiry essentials Applications and standards William Stallings 2nd ed. Uppper Saddle River Prentice Hall c2003 xv, 409 p. fig., tabl. 24 cm. Bibliography : p.381-387 Includes index Ασφάλεια υπολογιστών Υπολογιστές Δίκτυα Μέτρα ασφαλείας Διαδίκτυο (Internet) Μέτρα ασφαλείας Computer security Κρυπτογράφηση δεδομένων (Επιστήμη υπολογιστή) ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) 005.8 Stallings William Prentice Hall GR ΠΑ.Δ.Α. - Βιβλιοθήκη Πανεπιστημιούπολης 2 AACR2 INST LIBRARY 20031204 005.8 STA 000023088 000023088 BK 0 2 INST LIBRARY 20031204 005.8 STA 000023089 000023089 BK 23 1 |
| spellingShingle | Stallings William Network securiry essentials Applications and standards Ασφάλεια υπολογιστών Υπολογιστές Δίκτυα Μέτρα ασφαλείας Διαδίκτυο (Internet) Μέτρα ασφαλείας Computer security Κρυπτογράφηση δεδομένων (Επιστήμη υπολογιστή) ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) |
| title | Network securiry essentials Applications and standards |
| title_auth | Network securiry essentials Applications and standards |
| title_full | Network securiry essentials Applications and standards William Stallings |
| title_fullStr | Network securiry essentials Applications and standards William Stallings |
| title_full_unstemmed | Network securiry essentials Applications and standards William Stallings |
| title_short | Network securiry essentials |
| title_sub | Applications and standards |
| topic | Ασφάλεια υπολογιστών Υπολογιστές Δίκτυα Μέτρα ασφαλείας Διαδίκτυο (Internet) Μέτρα ασφαλείας Computer security Κρυπτογράφηση δεδομένων (Επιστήμη υπολογιστή) ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) |
| topic_facet | Ασφάλεια υπολογιστών Υπολογιστές Δίκτυα Μέτρα ασφαλείας Διαδίκτυο (Internet) Μέτρα ασφαλείας Computer security Κρυπτογράφηση δεδομένων (Επιστήμη υπολογιστή) |