Network security principles and practices

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Malik Saadat (Συγγραφέας)
Μορφή: Βιβλίο
Γλώσσα:English
Έκδοση: Cisco Press
Σειρά:Cisco Press

MARC

LEADER 00000cam a22000001 4500
001 1/8600
010 |a 1-58705-025-0 
035 |l 10013306 
100 |a 20080207e20052003 y0grey010503 ba 
101 0 |a eng 
200 1 |a Network security principles and practices  |f Saadat Malik 
210 |a Indianapolis  |c Cisco Press  |d 2003 
215 |a xxvii, 774 p.  |c fig., tabl.  |d 24 cm. 
225 2 |a CCIE Professional Development  |v 4955 
305 |a Fifth printing 2005 
410 1 |t CCIE Professional Development  |f Cisco Press  |v 4955 
606 0 |a Ασφάλεια υπολογιστών 
606 0 |a Υπολογιστές  |x Δίκτυα  |x Μέτρα ασφαλείας 
606 0 |a Firewalls (Computer security) 
615 |a ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) 
676 |a 005.8 
700 1 |a Malik  |b Saadat  |4 070 
709 |a Cisco Press 
801 0 |a GR  |b ΠΑ.Δ.Α. - Βιβλιοθήκη Πανεπιστημιούπολης 2  |c 20080207  |g AACR2 
852 |a INST  |b LIBRARY  |e 20080207  |h 005.8 MAL  |p 000027502  |q 000027502  |t BK  |y 0  |z 4 
852 |a INST  |b LIBRARY  |e 20080207  |h 005.8 MAL  |p 000027503  |q 000027503  |t BK  |y 0  |z 2 
852 |a INST  |b LIBRARY  |e 20080207  |h 005.8 MAL  |p 000027504  |q 000027504  |t BK  |y 0  |z 3 
852 |a INST  |b LIBRARY  |e 20080207  |h 005.8 MAL  |p 000027505  |q 000027505  |t BK  |y 23  |z 1 
909 |b 028254 
909 |b 028255 (c.2) 
909 |b 031573 (c.3) 
909 |b 031574 (c.4) 
960 |a ΦΕΒΡΟΥΑΡΙΟΣ 2008 

Εγγραφή στο Ευρετήριο Αναζήτησης

_version_ 1780545245293838339
author Malik Saadat
author_facet Malik Saadat
author_role 070
author_sort Malik Saadat
author_variant m s ms
building Campus Library II
collection LIB2 Catalog
dewey-full 005.8
dewey-hundreds 000
dewey-ones 005
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000
format Book
fullrecord {"leader":"01431cam a22003611 4500","fields":[{"001":"1/8600"},{"010":{"subfields":[{"a":"1-58705-025-0"}],"ind1":" ","ind2":" "}},{"035":{"subfields":[{"l":"10013306"}],"ind1":" ","ind2":" "}},{"100":{"subfields":[{"a":"20080207e20052003 y0grey010503 ba"}],"ind1":" ","ind2":" "}},{"101":{"subfields":[{"a":"eng"}],"ind1":"0","ind2":" "}},{"200":{"subfields":[{"a":"Network security principles and practices"},{"f":"Saadat Malik"}],"ind1":"1","ind2":" "}},{"210":{"subfields":[{"a":"Indianapolis"},{"c":"Cisco Press"},{"d":"2003"}],"ind1":" ","ind2":" "}},{"215":{"subfields":[{"a":"xxvii, 774 p."},{"c":"fig., tabl."},{"d":"24 cm."}],"ind1":" ","ind2":" "}},{"225":{"subfields":[{"a":"CCIE Professional Development"},{"v":"4955"}],"ind1":"2","ind2":" "}},{"305":{"subfields":[{"a":"Fifth printing 2005"}],"ind1":" ","ind2":" "}},{"410":{"subfields":[{"t":"CCIE Professional Development"},{"f":"Cisco Press"},{"v":"4955"}],"ind1":" ","ind2":"1"}},{"606":{"subfields":[{"a":"\u0391\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1 \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ce\u03bd"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u03a5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ad\u03c2"},{"x":"\u0394\u03af\u03ba\u03c4\u03c5\u03b1"},{"x":"\u039c\u03ad\u03c4\u03c1\u03b1 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"Firewalls (Computer security)"}],"ind1":"0","ind2":" "}},{"615":{"subfields":[{"a":"\u0395\u03a0\u0399\u03a3\u03a4\u0397\u039c\u0397 \u03a5\u03a0\u039f\u039b\u039f\u0393\u0399\u03a3\u03a4\u0397 (SOFTWARE)"}],"ind1":" ","ind2":" "}},{"676":{"subfields":[{"a":"005.8"}],"ind1":" ","ind2":" "}},{"700":{"subfields":[{"a":"Malik"},{"b":"Saadat"},{"4":"070"}],"ind1":" ","ind2":"1"}},{"709":{"subfields":[{"a":"Cisco Press"}],"ind1":" ","ind2":" "}},{"801":{"subfields":[{"a":"GR"},{"b":"\u03a0\u0391.\u0394.\u0391. - \u0392\u03b9\u03b2\u03bb\u03b9\u03bf\u03b8\u03ae\u03ba\u03b7 \u03a0\u03b1\u03bd\u03b5\u03c0\u03b9\u03c3\u03c4\u03b7\u03bc\u03b9\u03bf\u03cd\u03c0\u03bf\u03bb\u03b7\u03c2 2"},{"c":"20080207"},{"g":"AACR2"}],"ind1":" ","ind2":"0"}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20080207"},{"h":"005.8 MAL"},{"p":"000027502"},{"q":"000027502"},{"t":"BK"},{"y":"0"},{"z":"4"}],"ind1":" ","ind2":" "}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20080207"},{"h":"005.8 MAL"},{"p":"000027503"},{"q":"000027503"},{"t":"BK"},{"y":"0"},{"z":"2"}],"ind1":" ","ind2":" "}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20080207"},{"h":"005.8 MAL"},{"p":"000027504"},{"q":"000027504"},{"t":"BK"},{"y":"0"},{"z":"3"}],"ind1":" ","ind2":" "}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20080207"},{"h":"005.8 MAL"},{"p":"000027505"},{"q":"000027505"},{"t":"BK"},{"y":"23"},{"z":"1"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"028254"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"028255 (c.2)"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"031573 (c.3)"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"031574 (c.4)"}],"ind1":" ","ind2":" "}},{"960":{"subfields":[{"a":"\u03a6\u0395\u0392\u03a1\u039f\u03a5\u0391\u03a1\u0399\u039f\u03a3 2008"}],"ind1":" ","ind2":" "}}]}
id lib2_1/8600
illustrated Illustrated
institution University of West Attica
isbn 1-58705-025-0
language English
physical xxvii, 774 p. fig., tabl. 24 cm.
publishDate 2003
publisher Cisco Press
record_format marc
series Cisco Press
series2 CCIE Professional Development
spelling 20080207e20052003 y0grey010503 ba
eng
Network security principles and practices Saadat Malik
Indianapolis Cisco Press 2003
xxvii, 774 p. fig., tabl. 24 cm.
CCIE Professional Development 4955
Fifth printing 2005
CCIE Professional Development Cisco Press 4955
Ασφάλεια υπολογιστών
Υπολογιστές Δίκτυα Μέτρα ασφαλείας
Firewalls (Computer security)
ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE)
005.8
Malik Saadat 070
Cisco Press
GR ΠΑ.Δ.Α. - Βιβλιοθήκη Πανεπιστημιούπολης 2 20080207 AACR2
INST LIBRARY 20080207 005.8 MAL 000027502 000027502 BK 0 4
INST LIBRARY 20080207 005.8 MAL 000027503 000027503 BK 0 2
INST LIBRARY 20080207 005.8 MAL 000027504 000027504 BK 0 3
INST LIBRARY 20080207 005.8 MAL 000027505 000027505 BK 23 1
spellingShingle Malik Saadat
Network security principles and practices
Cisco Press
Ασφάλεια υπολογιστών
Υπολογιστές Δίκτυα Μέτρα ασφαλείας
Firewalls (Computer security)
ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE)
title Network security principles and practices
title_auth Network security principles and practices
title_full Network security principles and practices Saadat Malik
title_fullStr Network security principles and practices Saadat Malik
title_full_unstemmed Network security principles and practices Saadat Malik
title_short Network security principles and practices
topic Ασφάλεια υπολογιστών
Υπολογιστές Δίκτυα Μέτρα ασφαλείας
Firewalls (Computer security)
ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE)
topic_facet Ασφάλεια υπολογιστών
Υπολογιστές Δίκτυα Μέτρα ασφαλείας
Firewalls (Computer security)