Firewalls and internet security repelling the wily hacker
Κύριοι συγγραφείς: | , , |
---|---|
Μορφή: | Βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Addison-Wesley
|
Έκδοση: | 2nd ed. |
Σειρά: | Addison-Wesley Professional Computing series |
MARC
LEADER | 00000cam a22000001 4500 | ||
---|---|---|---|
001 | 1/9823 | ||
010 | |a 0-201-63466-X | ||
035 | |l 10013727 | ||
100 | |a 20081031d2003 y0grey010503 ba | ||
101 | 0 | |a eng | |
200 | 1 | |a Firewalls and internet security |e repelling the wily hacker |f William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin | |
205 | |a 2nd ed. | ||
210 | |a Boston |a San Francisco |c Addison-Wesley |d c2003 | ||
215 | |a xx, 433 p. |c fig. |d 24 cm. | ||
225 | 2 | |a Addison-Wesley Professional Computing series | |
300 | |a Πρόγραμμα "ΑΡΧΙΜΗΔΗΣ" | ||
320 | |a Bibliography: p.355-388 | ||
320 | |a Includes index | ||
410 | 1 | |t Addison-Wesley Professional Computing series | |
606 | 0 | |a Firewalls (Computer security) | |
606 | 0 | |a Διαδίκτυο (Internet) |x Μέτρα ασφαλείας | |
615 | |a ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) | ||
676 | |a 005.8 | ||
700 | 1 | |a Cheswick |b William R. |4 070 | |
701 | 1 | |a Bellovin |b Steven M. |4 070 | |
701 | 1 | |a Rubin |b Aviel D. |4 070 | |
709 | |a Addison-Wesley | ||
801 | 0 | |a GR |b ΠΑ.Δ.Α. Βιβλιοθήκη Πανεπιστημιούπολης 2 |c 20081031 |g AACR2 | |
852 | |a INST |b LIBRARY |e 20081031 |h 005.8 CHE |p 000032274 |q 000032274 |t BK |y 23 |z 1 | ||
909 | |b 028553 | ||
960 | |a ΟΚΤΩΒΡΙΟΣ 2008 |
Εγγραφή στο Ευρετήριο Αναζήτησης
_version_ | 1780545245777231872 |
---|---|
author | Cheswick William R. Bellovin Steven M. Rubin Aviel D. |
author_facet | Cheswick William R. Bellovin Steven M. Rubin Aviel D. |
author_role | 070 070 070 |
author_sort | Cheswick William R. |
author_variant | c w r cwr b s m bsm r a d rad |
building | Campus Library II |
collection | LIB2 Catalog |
dewey-full | 005.8 |
dewey-hundreds | 000 |
dewey-ones | 005 |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 |
edition | 2nd ed. |
format | Book |
fullrecord | {"leader":"01297cam a22003371 4500","fields":[{"001":"1/9823"},{"010":{"subfields":[{"a":"0-201-63466-X"}],"ind1":" ","ind2":" "}},{"035":{"subfields":[{"l":"10013727"}],"ind1":" ","ind2":" "}},{"100":{"subfields":[{"a":"20081031d2003 y0grey010503 ba"}],"ind1":" ","ind2":" "}},{"101":{"subfields":[{"a":"eng"}],"ind1":"0","ind2":" "}},{"200":{"subfields":[{"a":"Firewalls and internet security"},{"e":"repelling the wily hacker"},{"f":"William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin"}],"ind1":"1","ind2":" "}},{"205":{"subfields":[{"a":"2nd ed."}],"ind1":" ","ind2":" "}},{"210":{"subfields":[{"a":"Boston"},{"a":"San Francisco"},{"c":"Addison-Wesley"},{"d":"c2003"}],"ind1":" ","ind2":" "}},{"215":{"subfields":[{"a":"xx, 433 p."},{"c":"fig."},{"d":"24 cm."}],"ind1":" ","ind2":" "}},{"225":{"subfields":[{"a":"Addison-Wesley Professional Computing series"}],"ind1":"2","ind2":" "}},{"300":{"subfields":[{"a":"\u03a0\u03c1\u03cc\u03b3\u03c1\u03b1\u03bc\u03bc\u03b1 \"\u0391\u03a1\u03a7\u0399\u039c\u0397\u0394\u0397\u03a3\""}],"ind1":" ","ind2":" "}},{"320":{"subfields":[{"a":"Bibliography: p.355-388"}],"ind1":" ","ind2":" "}},{"320":{"subfields":[{"a":"Includes index"}],"ind1":" ","ind2":" "}},{"410":{"subfields":[{"t":"Addison-Wesley Professional Computing series"}],"ind1":" ","ind2":"1"}},{"606":{"subfields":[{"a":"Firewalls (Computer security)"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u0394\u03b9\u03b1\u03b4\u03af\u03ba\u03c4\u03c5\u03bf (Internet)"},{"x":"\u039c\u03ad\u03c4\u03c1\u03b1 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2"}],"ind1":"0","ind2":" "}},{"615":{"subfields":[{"a":"\u0395\u03a0\u0399\u03a3\u03a4\u0397\u039c\u0397 \u03a5\u03a0\u039f\u039b\u039f\u0393\u0399\u03a3\u03a4\u0397 (SOFTWARE)"}],"ind1":" ","ind2":" "}},{"676":{"subfields":[{"a":"005.8"}],"ind1":" ","ind2":" "}},{"700":{"subfields":[{"a":"Cheswick"},{"b":"William R."},{"4":"070"}],"ind1":" ","ind2":"1"}},{"701":{"subfields":[{"a":"Bellovin"},{"b":"Steven M."},{"4":"070"}],"ind1":" ","ind2":"1"}},{"701":{"subfields":[{"a":"Rubin"},{"b":"Aviel D."},{"4":"070"}],"ind1":" ","ind2":"1"}},{"709":{"subfields":[{"a":"Addison-Wesley"}],"ind1":" ","ind2":" "}},{"801":{"subfields":[{"a":"GR"},{"b":"\u03a0\u0391.\u0394.\u0391. \u0392\u03b9\u03b2\u03bb\u03b9\u03bf\u03b8\u03ae\u03ba\u03b7 \u03a0\u03b1\u03bd\u03b5\u03c0\u03b9\u03c3\u03c4\u03b7\u03bc\u03b9\u03bf\u03cd\u03c0\u03bf\u03bb\u03b7\u03c2 2"},{"c":"20081031"},{"g":"AACR2"}],"ind1":" ","ind2":"0"}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20081031"},{"h":"005.8 CHE"},{"p":"000032274"},{"q":"000032274"},{"t":"BK"},{"y":"23"},{"z":"1"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"028553"}],"ind1":" ","ind2":" "}},{"960":{"subfields":[{"a":"\u039f\u039a\u03a4\u03a9\u0392\u03a1\u0399\u039f\u03a3 2008"}],"ind1":" ","ind2":" "}}]}
|
id | lib2_1/9823 |
illustrated | Illustrated |
institution | University of West Attica |
isbn | 0-201-63466-X |
language | English |
physical | xx, 433 p. fig. 24 cm. |
publishDate | 2003 |
publisher | Addison-Wesley |
record_format | marc |
series2 | Addison-Wesley Professional Computing series |
spelling | 20081031d2003 y0grey010503 ba eng Firewalls and internet security repelling the wily hacker William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin 2nd ed. Boston San Francisco Addison-Wesley c2003 xx, 433 p. fig. 24 cm. Addison-Wesley Professional Computing series Πρόγραμμα "ΑΡΧΙΜΗΔΗΣ" Bibliography: p.355-388 Includes index Firewalls (Computer security) Διαδίκτυο (Internet) Μέτρα ασφαλείας ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) 005.8 Cheswick William R. 070 Bellovin Steven M. 070 Rubin Aviel D. 070 Addison-Wesley GR ΠΑ.Δ.Α. Βιβλιοθήκη Πανεπιστημιούπολης 2 20081031 AACR2 INST LIBRARY 20081031 005.8 CHE 000032274 000032274 BK 23 1 |
spellingShingle | Cheswick William R. Bellovin Steven M. Rubin Aviel D. Firewalls and internet security repelling the wily hacker Firewalls (Computer security) Διαδίκτυο (Internet) Μέτρα ασφαλείας ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) |
title | Firewalls and internet security repelling the wily hacker |
title_auth | Firewalls and internet security repelling the wily hacker |
title_full | Firewalls and internet security repelling the wily hacker William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin |
title_fullStr | Firewalls and internet security repelling the wily hacker William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin |
title_full_unstemmed | Firewalls and internet security repelling the wily hacker William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin |
title_short | Firewalls and internet security |
title_sub | repelling the wily hacker |
topic | Firewalls (Computer security) Διαδίκτυο (Internet) Μέτρα ασφαλείας ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) |
topic_facet | Firewalls (Computer security) Διαδίκτυο (Internet) Μέτρα ασφαλείας |