000 01763cam a2200517M 4500
005 20250919211745.0
006 m o d
007 cr un|---uuuuu
008 171212s2012 xx o 000 0 eng d
020 _a9781118820650
_q(electronic bk.)
020 _a1118820657
_q(electronic bk.)
020 _z1283656272
020 _z9781283656276
020 _z6613968773
020 _z9786613968777
029 1 _aAU@
_b000058062504
029 1 _aGBVCP
_b856570478
029 1 _aDEBBG
_bBV043395186
035 _a(OCoLC)817828328
_z(OCoLC)813535609
035 _a(OCoLC)ocn817828328
039 9 _a201902121412
_bros
_y12-12-2017
_zhafiz
_wMYUKM (1).mrc
_x466
040 _aIDEBK
_beng
_epn
_cIDEBK
_dOCLCQ
_dDG1
_dOCLCF
_dOCLCQ
_dDEBBG
049 _aMAIN
050 4 _aHF5548.37
082 0 4 _a658.4/78
_222
245 0 0 _aComputer Security Handbook.
260 _bWiley
_c2012.
300 _a1 online resource (2033 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
650 0 _aElectronic data processing departments
_xSecurity measures.
650 7 _aElectronic data processing departments
_xSecurity measures.
_2fast
_0(OCoLC)fst00907090
655 4 _aElectronic books.
700 1 _aBosworth, Seymour.
_4edt
700 1 _aKabay, M. E.
_4edt
700 1 _aWhyne, Eric.
_4edt
773 0 _tWiley e-books
856 4 0 _uhttps://eresourcesptsl.ukm.remotexs.co/user/login?url=http://onlinelibrary.wiley.com/book/10.1002/9781118820650
_zWiley Online Library
907 _a.b16542083
_b2022-11-02
_c2019-11-12
942 _n0
914 _avtls003629138
998 _ae
_b2017-12-12
_cm
_dz
_feng
_gxx
_y0
_z.b16542083
999 _c689151
_d689151