000 01515cam a2200469M 4500
001 ocn817828328
003 OCoLC
005 20171224114112.0
006 m o d
007 cr un|---uuuuu
008 121013s2012 xx o 000 0 eng d
040 _aIDEBK
_beng
_epn
_cIDEBK
_dOCLCQ
_dDG1
_dOCLCF
_dOCLCQ
_dDEBBG
019 _a813535609
020 _a9781118820650
_q(electronic bk.)
020 _a1118820657
_q(electronic bk.)
020 _z1283656272
020 _z9781283656276
020 _z6613968773
020 _z9786613968777
029 1 _aAU@
_b000058062504
029 1 _aGBVCP
_b856570478
029 1 _aDEBBG
_bBV043395186
035 _a(OCoLC)817828328
_z(OCoLC)813535609
050 4 _aHF5548.37
082 0 4 _a658.4/78
_222
049 _aMAIN
245 0 0 _aComputer Security Handbook.
260 _bWiley
_c2012.
300 _a1 online resource (2033 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
650 0 _aElectronic data processing departments
_xSecurity measures.
650 7 _aElectronic data processing departments
_xSecurity measures.
_2fast
_0(OCoLC)fst00907090
655 4 _aElectronic books.
700 1 _aBosworth, Seymour.
_4edt
700 1 _aKabay, M. E.
_4edt
700 1 _aWhyne, Eric.
_4edt
856 4 0 _uhttp://onlinelibrary.wiley.com/book/10.1002/9781118820650
_zWiley Online Library
938 _aIngram Digital eBook Collection
_bIDEB
_n396877
994 _a92
_bDG1
999 _c12276
_d12276