Network Security Bible
Saved in:
Main Author: | |
---|---|
Format: | TEXT |
Published: |
Willey Publishing, Inc.
|
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
amikomlib-3944 |
---|---|
record_format |
oai_dc |
spelling |
amikomlib-39442016-08-08 00:00:00Resource Centre UNIVERSITAS AMIKOM YOGYAKARTANetwork Security BibleEric ColeThe Network Security Bible is organized into five sections: Security Principles and Practices, Operating Systems and Applications, Network Security, Communications and The Security Threat and Response. The flow of the material is intended to provide the reWilley Publishing, Inc.TEXT |
institution |
Universitas Amikom Yogyakarta |
collection |
Perpustakaan Yogyakarta |
topic |
The Network Security Bible is organized into five sections: Security Principles and Practices, Operating Systems and Applications, Network Security, Communications and The Security Threat and Response. The flow of the material is intended to provide the re |
spellingShingle |
The Network Security Bible is organized into five sections: Security Principles and Practices, Operating Systems and Applications, Network Security, Communications and The Security Threat and Response. The flow of the material is intended to provide the re Eric Cole Network Security Bible |
description |
|
format |
TEXT |
author |
Eric Cole |
author_facet |
Eric Cole |
author_sort |
Eric Cole |
title |
Network Security Bible |
title_short |
Network Security Bible |
title_full |
Network Security Bible |
title_fullStr |
Network Security Bible |
title_full_unstemmed |
Network Security Bible |
title_sort |
network security bible |
publisher |
Willey Publishing, Inc. |
publishDate |
|
_version_ |
1742475962405093376 |