000 01289nam a22003973a 4500
001 599360
005 20230417180328.0
006 m d
007 cr||n|||||||||
008 090625s2009 njua fs 001 0 eng d
020 _a9786612303487 (electronic bk.)
020 _z9780470502495 (pbk.)
020 _z0470502495 (pbk.)
020 _a9780470569993 (ebk.)
020 _z0470569999 (ebk.)
035 _a(CaONFJC)cis10953460
037 _a230348
_bMIL
040 _aCaONFJC
_cCaONFJC
_dUK-LoTVU
_dUkLoUWL
050 4 _aTK5105.59
_b.C65 2009eb
082 0 4 _a005.8
_222
100 1 _aCole, Eric.
245 1 0 _aNetwork security bible /
_cEric Cole, Ronald L. Krutz, James W. Conley.
250 _a2nd edition.
260 _aIndianapolis, Ind. :
_bWiley,
_cc2009.
300 _axliv, 892 p. :
_bill.
500 _aPrevious ed.: 2005.
500 _aIncludes index.
530 _aAlso available in print.
533 _aElectronic reproduction.
_bUK :
_cMyiLibrary,
_d2009.
650 0 _aComputer networks
_xSecurity measures.
700 1 _aKrutz, Ronald L.,
_d1938-
700 1 _aConley, James W.
776 0 _cOriginal.
_w()0470502495
856 4 0 _uhttps://ebookcentral.proquest.com/lib/uwestlon/detail.action?docID=469292
_zOpen e-book
942 _n0
_2ddc
999 _c27879
_d27879