| 000 | 01279cam a2200313 n 4500 | ||
|---|---|---|---|
| 999 |
_c5609 _d5609 |
||
| 001 | 16342136 | ||
| 005 | 20210427092758.0 | ||
| 008 | 100721s2011 maua b 001 0 eng | ||
| 010 | _a 2010028536 | ||
| 020 | _a9780321512949 (alk. paper) | ||
| 020 | _a0321512944 (alk. paper) | ||
| 040 |
_aDLC _cDLC _dDLC _erda |
||
| 050 | 0 | 0 |
_aQA76.9.A25 _bG655 2011 |
| 082 | 0 | 0 |
_a005.8 _222 _bG.M.I |
| 100 | 1 |
_aGoodrich, Michael T. _925915 |
|
| 245 | 1 | 0 |
_aIntroduction to computer security / _cMichael T. Goodrich & Roberto Tamassia. |
| 264 | 1 |
_aBoston : _bAddison-Wesley, _cc2011. |
|
| 300 |
_axix, 556 pages. : _billustrations ; _c27 cm. |
||
| 336 |
_2rdacontent _atext |
||
| 337 |
_2rdamedia _aunmediated |
||
| 338 |
_2rdacarrier _avolume |
||
| 504 | _aIncludes bibliographical references (p. 541-546) and index. | ||
| 505 | 0 | _a1 Introduction -2 Physical Security 55 - 3 Operating Systems Security 113 -4 Malware 173 - 5 Network Security I 221 - 6 Network Security II 269 - 7 Web Security 327 - 8 Cryptography 387 - 9 Security Models and Practice 445 - 10 Distributed-Applications Security 487 - | |
| 650 | 0 |
_aComputer security. _925916 |
|
| 700 | 1 |
_aTamassia, Roberto, _d1960- _925917 |
|
| 942 |
_cBK _2ddc |
||