It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 03492cam a22007814a 4500
001 ocm57722506
003 OCoLC
005 20191109073628.6
008 050215s2005 nyua b 001 0 eng
010 $a 2005040436
040 $aDLC$beng$cDLC$dYDXCP$dUKM$dOHX$dBAKER$dIXA$dBTCTA$dLVB$dIG#$dSTF$dTAMCT$dDEBBG$dOH@$dILU$dOCLCF$dOCLCQ$dOCLCO$dOCLCQ$dOKR$dERR$dOCLCA$dUKMGB
015 $aGBA536901$2bnb
016 7 $a969084404$2DE-101
016 7 $a013186129$2Uk
016 7 $a969084404$2GyFmDB
020 $a0387204733$q(hc ;$qalk. paper)
020 $a9780387204734$q(hc ;$qalk. paper)
020 $a0387252282$q(ebook)
020 $a9780387252285$q(ebook)
024 3 $a9780387204734$q(cased ;$qalk. paper)
029 1 $aAU@$b000026747745
029 1 $aDEBBG$bBV019876399
029 1 $aIG#$b9780387204734
029 1 $aNZ1$b9179219
029 1 $aYDXCP$b2197576
029 1 $aUKMGB$b013186129
035 $a(OCoLC)57722506
042 $apcc
050 00 $aTK5105.59$b.K578 2005
072 7 $aZ$2lcco
082 00 $a005.8$222
084 $aDAT 461f$2stub
084 $aST 277$2rvk
049 $aMAIN
100 1 $aKizza, Joseph Migga.
245 10 $aComputer network security /$cJoseph Migga Kizza.
260 $aNew York :$bSpringer,$c2005.
300 $axxii, 534 pages :$billustrations ;$c24 cm
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
504 $aIncludes bibliographical references and index.
505 0 $aUnderstanding Computer Network Security -- Security Challenges to Computer Networks -- Dealing with Network Security Challenges.
520 1 $a"This text is an invaluable instructional and research tool for courses in computer and information security. Students or practitioners in computer science, information science, technology studies, library sciences, and information management studies will find this text particularly useful for their purposes. In addition, it is a resource for those looking to gain an understanding of computer infrastructures and network security threats."--Jacket.
590 $bInternet Archive - 2
590 $bInternet Archive 2
650 0 $aComputer networks$xSecurity measures.
650 6 $aRéseaux d'ordinateurs$xSécurité$xMesures.
650 7 $aComputer networks$xSecurity measures.$2fast$0(OCoLC)fst00872341
650 7 $aComputersicherheit$2gnd
650 7 $aDatensicherung$2gnd
650 7 $aRechnernetz$2gnd
650 07 $aComputersicherheit.$2swd
650 07 $aDatensicherung.$2swd
650 07 $aRechnernetz.$2swd
856 41 $3ebrary$uhttp://site.ebrary.com/id/10229115
856 41 $3MyiLibrary$uhttp://www.myilibrary.com?id=133415
856 41 $3SpringerLink$uhttp://www.springerlink.com/openurl.asp?genre=book&isbn=978-0-387-20473-4
856 41 $3Table of contents$uhttp://catdir.loc.gov/catdir/enhancements/fy0818/2005040436-t.html
856 42 $3Contributor biographical information$uhttp://catdir.loc.gov/catdir/enhancements/fy0818/2005040436-b.html
856 42 $3Publisher description$uhttp://catdir.loc.gov/catdir/enhancements/fy0662/2005040436-d.html
938 $aBaker & Taylor$bBKTY$c99.00$d99.00$i0387204733$n0006284584$sactive
938 $aBaker and Taylor$bBTCP$n2005040436
938 $aOtto Harrassowitz$bHARR$nhar030130715
938 $aIngram$bINGR$n9780387204734
938 $aYBP Library Services$bYANK$n2197576
994 $a92$bERR
976 $a31927000604956