Computer and communications security strategies for the 1990s

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Cooper James A. (Συγγραφέας)
Μορφή: Βιβλίο
Γλώσσα:English
Έκδοση: McGraw-Hill

MARC

LEADER 00000cam0a2200000 4500
001 1/776
010 |a 0-07-012926-6 
035 |l 10003175 
100 |a 19981001d1989 0grey0105 ba 
101 0 |a eng 
200 1 |a Computer and communications security  |e strategies for the 1990s  |f James Arlin Cooper 
210 |a New York  |c McGraw-Hill  |d c1989 
215 |a xix, 411 p.  |c fig.  |d 24 cm. 
320 |a Includes bibliographical references and index. 
606 0 |a Ηλεκτρονικοί υπολογιστές  |x Ελεγχος προσπέλασης 
606 0 |a Κρυπτογραφία 
606 0 |a Ασφάλεια υπολογιστών 
676 |a 005.8 
700 1 |a Cooper  |b James A.  |4 070 
709 |a McGraw-Hill 
801 0 |a GR  |b ΠΑ.Δ.Α. - Βιβλιοθήκη Πανεπιστημιούπολης 2  |g AACR2 
852 |a INST  |b LIBRARY  |e 19981008  |h 005.8 COO  |p 000002311  |q 000002311  |t BK  |y 23  |z 1 
909 |b 008398 

Εγγραφή στο Ευρετήριο Αναζήτησης

_version_ 1780545244430860290
author Cooper James A.
author_facet Cooper James A.
author_role 070
author_sort Cooper James A.
author_variant c j a cja
building Campus Library II
collection LIB2 Catalog
dewey-full 005.8
dewey-hundreds 000
dewey-ones 005
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000
format Book
fullrecord {"leader":"00917cam0a2200241 4500","fields":[{"001":"1/776"},{"010":{"subfields":[{"a":"0-07-012926-6"}],"ind1":" ","ind2":" "}},{"035":{"subfields":[{"l":"10003175"}],"ind1":" ","ind2":" "}},{"100":{"subfields":[{"a":"19981001d1989 0grey0105 ba"}],"ind1":" ","ind2":" "}},{"101":{"subfields":[{"a":"eng"}],"ind1":"0","ind2":" "}},{"200":{"subfields":[{"a":"Computer and communications security"},{"e":"strategies for the 1990s"},{"f":"James Arlin Cooper"}],"ind1":"1","ind2":" "}},{"210":{"subfields":[{"a":"New York"},{"c":"McGraw-Hill"},{"d":"c1989"}],"ind1":" ","ind2":" "}},{"215":{"subfields":[{"a":"xix, 411 p."},{"c":"fig."},{"d":"24 cm."}],"ind1":" ","ind2":" "}},{"320":{"subfields":[{"a":"Includes bibliographical references and index."}],"ind1":" ","ind2":" "}},{"606":{"subfields":[{"a":"\u0397\u03bb\u03b5\u03ba\u03c4\u03c1\u03bf\u03bd\u03b9\u03ba\u03bf\u03af \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ad\u03c2"},{"x":"\u0395\u03bb\u03b5\u03b3\u03c7\u03bf\u03c2 \u03c0\u03c1\u03bf\u03c3\u03c0\u03ad\u03bb\u03b1\u03c3\u03b7\u03c2"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u039a\u03c1\u03c5\u03c0\u03c4\u03bf\u03b3\u03c1\u03b1\u03c6\u03af\u03b1"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u0391\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1 \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ce\u03bd"}],"ind1":"0","ind2":" "}},{"676":{"subfields":[{"a":"005.8"}],"ind1":" ","ind2":" "}},{"700":{"subfields":[{"a":"Cooper"},{"b":"James A."},{"4":"070"}],"ind1":" ","ind2":"1"}},{"709":{"subfields":[{"a":"McGraw-Hill"}],"ind1":" ","ind2":" "}},{"801":{"subfields":[{"a":"GR"},{"b":"\u03a0\u0391.\u0394.\u0391. - \u0392\u03b9\u03b2\u03bb\u03b9\u03bf\u03b8\u03ae\u03ba\u03b7 \u03a0\u03b1\u03bd\u03b5\u03c0\u03b9\u03c3\u03c4\u03b7\u03bc\u03b9\u03bf\u03cd\u03c0\u03bf\u03bb\u03b7\u03c2 2"},{"g":"AACR2"}],"ind1":" ","ind2":"0"}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"19981008"},{"h":"005.8 COO"},{"p":"000002311"},{"q":"000002311"},{"t":"BK"},{"y":"23"},{"z":"1"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"008398"}],"ind1":" ","ind2":" "}}]}
id lib2_1/776
illustrated Illustrated
institution University of West Attica
isbn 0-07-012926-6
language English
physical xix, 411 p. fig. 24 cm.
publishDate 1989
publisher McGraw-Hill
record_format marc
spelling 19981001d1989 0grey0105 ba
eng
Computer and communications security strategies for the 1990s James Arlin Cooper
New York McGraw-Hill c1989
xix, 411 p. fig. 24 cm.
Includes bibliographical references and index.
Ηλεκτρονικοί υπολογιστές Ελεγχος προσπέλασης
Κρυπτογραφία
Ασφάλεια υπολογιστών
005.8
Cooper James A. 070
McGraw-Hill
GR ΠΑ.Δ.Α. - Βιβλιοθήκη Πανεπιστημιούπολης 2 AACR2
INST LIBRARY 19981008 005.8 COO 000002311 000002311 BK 23 1
spellingShingle Cooper James A.
Computer and communications security strategies for the 1990s
Ηλεκτρονικοί υπολογιστές Ελεγχος προσπέλασης
Κρυπτογραφία
Ασφάλεια υπολογιστών
title Computer and communications security strategies for the 1990s
title_auth Computer and communications security strategies for the 1990s
title_full Computer and communications security strategies for the 1990s James Arlin Cooper
title_fullStr Computer and communications security strategies for the 1990s James Arlin Cooper
title_full_unstemmed Computer and communications security strategies for the 1990s James Arlin Cooper
title_short Computer and communications security
title_sub strategies for the 1990s
topic Ηλεκτρονικοί υπολογιστές Ελεγχος προσπέλασης
Κρυπτογραφία
Ασφάλεια υπολογιστών
topic_facet Ηλεκτρονικοί υπολογιστές Ελεγχος προσπέλασης
Κρυπτογραφία
Ασφάλεια υπολογιστών