Computer networking a top-down approach featuring the internet
Κύριοι συγγραφείς: | , |
---|---|
Μορφή: | Βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Pearson/Addison Wesley
|
Έκδοση: | 3rd ed. |
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | 1/8250 | ||
010 | |a 0-321-26976-4 | ||
035 | |l 10013188 | ||
100 | |a 20071029d2005 y0grey010503 ba | ||
101 | 0 | |a eng | |
200 | 1 | |a Computer networking |e a top-down approach featuring the internet |f James F. Kurose, Keith W. Ross | |
205 | |a 3rd ed. | ||
210 | |a Boston |c Pearson/Addison Wesley |d c2005 | ||
215 | |a xxiv, 821 p. |c fig., tabl. |d 23 cm. | ||
320 | |a Bibliography: p.763-795 | ||
320 | |a Includes index | ||
606 | 0 | |a Διαδίκτυο (Internet) | |
606 | 0 | |a Υπολογιστές |x Δίκτυα |x Διαχείριση | |
606 | 0 | |a Υπολογιστές |x Δίκτυα |x Μέτρα ασφαλείας | |
615 | |a ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) | ||
676 | |a 004.678 | ||
700 | 1 | |a Kurose |b James F. |4 070 | |
701 | 1 | |a Ross |b Keith W. |4 070 | |
709 | |a Pearson/Addison Wesley | ||
801 | 0 | |a GR |b ΠΑ.Δ.Α. - Βιβλιοθήκη Πανεπιστημιούπολης 2 |c 20071029 |g AACR2 | |
852 | |a INST |b LIBRARY |e 20071030 |h 004.678 KUR |p 000030646 |q 000030646 |t BK |y 0 |z 3 | ||
852 | |a INST |b LIBRARY |e 20071029 |h 004.678 KUR |p 000030650 |q 000030650 |t BK |y 23 |z 1 | ||
852 | |a INST |b LIBRARY |e 20071029 |h 004.678 KUR |p 000030651 |q 000030651 |t BK |y 0 |z 2 | ||
909 | |b 028087 | ||
909 | |b 028088 (c.2) | ||
909 | |b 028089 (c.3) | ||
960 | |a ΟΚΤΩΒΡΙΟΣ 2007 |
Εγγραφή στο Ευρετήριο Αναζήτησης
_version_ | 1780545245007577089 |
---|---|
author | Kurose James F. Ross Keith W. |
author_facet | Kurose James F. Ross Keith W. |
author_role | 070 070 |
author_sort | Kurose James F. |
author_variant | k j f kjf r k w rkw |
building | Campus Library II |
collection | LIB2 Catalog |
dewey-full | 004.678 |
dewey-hundreds | 000 |
dewey-ones | 004 |
dewey-raw | 004.678 |
dewey-search | 004.678 |
dewey-sort | 14.678 |
dewey-tens | 000 |
edition | 3rd ed. |
format | Book |
fullrecord | {"leader":"01380cam a2200349 i 4500","fields":[{"001":"1/8250"},{"010":{"subfields":[{"a":"0-321-26976-4"}],"ind1":" ","ind2":" "}},{"035":{"subfields":[{"l":"10013188"}],"ind1":" ","ind2":" "}},{"100":{"subfields":[{"a":"20071029d2005 y0grey010503 ba"}],"ind1":" ","ind2":" "}},{"101":{"subfields":[{"a":"eng"}],"ind1":"0","ind2":" "}},{"200":{"subfields":[{"a":"Computer networking"},{"e":"a top-down approach featuring the internet"},{"f":"James F. Kurose, Keith W. Ross"}],"ind1":"1","ind2":" "}},{"205":{"subfields":[{"a":"3rd ed."}],"ind1":" ","ind2":" "}},{"210":{"subfields":[{"a":"Boston"},{"c":"Pearson/Addison Wesley"},{"d":"c2005"}],"ind1":" ","ind2":" "}},{"215":{"subfields":[{"a":"xxiv, 821 p."},{"c":"fig., tabl."},{"d":"23 cm."}],"ind1":" ","ind2":" "}},{"320":{"subfields":[{"a":"Bibliography: p.763-795"}],"ind1":" ","ind2":" "}},{"320":{"subfields":[{"a":"Includes index"}],"ind1":" ","ind2":" "}},{"606":{"subfields":[{"a":"\u0394\u03b9\u03b1\u03b4\u03af\u03ba\u03c4\u03c5\u03bf (Internet)"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u03a5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ad\u03c2"},{"x":"\u0394\u03af\u03ba\u03c4\u03c5\u03b1"},{"x":"\u0394\u03b9\u03b1\u03c7\u03b5\u03af\u03c1\u03b9\u03c3\u03b7"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u03a5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ad\u03c2"},{"x":"\u0394\u03af\u03ba\u03c4\u03c5\u03b1"},{"x":"\u039c\u03ad\u03c4\u03c1\u03b1 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2"}],"ind1":"0","ind2":" "}},{"615":{"subfields":[{"a":"\u0395\u03a0\u0399\u03a3\u03a4\u0397\u039c\u0397 \u03a5\u03a0\u039f\u039b\u039f\u0393\u0399\u03a3\u03a4\u0397 (SOFTWARE)"}],"ind1":" ","ind2":" "}},{"676":{"subfields":[{"a":"004.678"}],"ind1":" ","ind2":" "}},{"700":{"subfields":[{"a":"Kurose"},{"b":"James F."},{"4":"070"}],"ind1":" ","ind2":"1"}},{"701":{"subfields":[{"a":"Ross"},{"b":"Keith W."},{"4":"070"}],"ind1":" ","ind2":"1"}},{"709":{"subfields":[{"a":"Pearson/Addison Wesley"}],"ind1":" ","ind2":" "}},{"801":{"subfields":[{"a":"GR"},{"b":"\u03a0\u0391.\u0394.\u0391. - \u0392\u03b9\u03b2\u03bb\u03b9\u03bf\u03b8\u03ae\u03ba\u03b7 \u03a0\u03b1\u03bd\u03b5\u03c0\u03b9\u03c3\u03c4\u03b7\u03bc\u03b9\u03bf\u03cd\u03c0\u03bf\u03bb\u03b7\u03c2 2"},{"c":"20071029"},{"g":"AACR2"}],"ind1":" ","ind2":"0"}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20071030"},{"h":"004.678 KUR"},{"p":"000030646"},{"q":"000030646"},{"t":"BK"},{"y":"0"},{"z":"3"}],"ind1":" ","ind2":" "}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20071029"},{"h":"004.678 KUR"},{"p":"000030650"},{"q":"000030650"},{"t":"BK"},{"y":"23"},{"z":"1"}],"ind1":" ","ind2":" "}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20071029"},{"h":"004.678 KUR"},{"p":"000030651"},{"q":"000030651"},{"t":"BK"},{"y":"0"},{"z":"2"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"028087 "}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"028088 (c.2)"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"028089 (c.3)"}],"ind1":" ","ind2":" "}},{"960":{"subfields":[{"a":"\u039f\u039a\u03a4\u03a9\u0392\u03a1\u0399\u039f\u03a3 2007"}],"ind1":" ","ind2":" "}}]}
|
id | lib2_1/8250 |
illustrated | Illustrated |
institution | University of West Attica |
isbn | 0-321-26976-4 |
language | English |
physical | xxiv, 821 p. fig., tabl. 23 cm. |
publishDate | 2005 |
publisher | Pearson/Addison Wesley |
record_format | marc |
spelling | 20071029d2005 y0grey010503 ba eng Computer networking a top-down approach featuring the internet James F. Kurose, Keith W. Ross 3rd ed. Boston Pearson/Addison Wesley c2005 xxiv, 821 p. fig., tabl. 23 cm. Bibliography: p.763-795 Includes index Διαδίκτυο (Internet) Υπολογιστές Δίκτυα Διαχείριση Υπολογιστές Δίκτυα Μέτρα ασφαλείας ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) 004.678 Kurose James F. 070 Ross Keith W. 070 Pearson/Addison Wesley GR ΠΑ.Δ.Α. - Βιβλιοθήκη Πανεπιστημιούπολης 2 20071029 AACR2 INST LIBRARY 20071030 004.678 KUR 000030646 000030646 BK 0 3 INST LIBRARY 20071029 004.678 KUR 000030650 000030650 BK 23 1 INST LIBRARY 20071029 004.678 KUR 000030651 000030651 BK 0 2 |
spellingShingle | Kurose James F. Ross Keith W. Computer networking a top-down approach featuring the internet Διαδίκτυο (Internet) Υπολογιστές Δίκτυα Διαχείριση Υπολογιστές Δίκτυα Μέτρα ασφαλείας ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) |
title | Computer networking a top-down approach featuring the internet |
title_auth | Computer networking a top-down approach featuring the internet |
title_full | Computer networking a top-down approach featuring the internet James F. Kurose, Keith W. Ross |
title_fullStr | Computer networking a top-down approach featuring the internet James F. Kurose, Keith W. Ross |
title_full_unstemmed | Computer networking a top-down approach featuring the internet James F. Kurose, Keith W. Ross |
title_short | Computer networking |
title_sub | a top-down approach featuring the internet |
topic | Διαδίκτυο (Internet) Υπολογιστές Δίκτυα Διαχείριση Υπολογιστές Δίκτυα Μέτρα ασφαλείας ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) |
topic_facet | Διαδίκτυο (Internet) Υπολογιστές Δίκτυα Διαχείριση Υπολογιστές Δίκτυα Μέτρα ασφαλείας |