| 000 | 01212cam a22003254a 4500 | ||
|---|---|---|---|
| 005 | 20250914154319.0 | ||
| 008 | 060927s2006 njua b 001 0 eng | ||
| 010 | _a2005-016854 | ||
| 020 |
_a0131547291 _cRM284.15 |
||
| 039 | 9 |
_a200803111607 _blan _c200802250851 _drahah _c200609270911 _drahah _y09-27-2006 _zrahah |
|
| 040 | _aUKM | ||
| 090 | _aQA76.9.A25M377 | ||
| 090 |
_aQA76.9.A25 _bM377 |
||
| 100 | 1 | _aMerkow, Mark S. | |
| 245 | 1 | 0 |
_aInformation security : _bprinciples and practices / _cMark S. Merkow, Jim Breithaupt |
| 260 |
_aUpper Saddle River, New Jersey : _bPearson Prentice Hall, _c2006 |
||
| 300 |
_axxvii, 420 p. : _bill. ; _c24 cm. |
||
| 490 | 1 | _aSecurity series | |
| 504 | _aIncludes bibliographical references (p. 409-413) and index | ||
| 650 | 0 | _aComputer security | |
| 700 | 1 |
_aBreithaupt, Jim, _d1955- |
|
| 830 | 0 | _aSecurity series (Upper Saddle River, N.J.) | |
| 856 | 4 | 1 |
_3Table of contents _uhttp://www.loc.gov/catdir/toc/ecip0514/2005016854.html |
| 907 |
_a.b13808898 _b2021-05-28 _c2019-11-12 |
||
| 942 |
_c01 _n0 _kQA76.9.A25M377 |
||
| 914 | _avtls003335765 | ||
| 991 | _aJabatan Sains Maklumat | ||
| 998 |
_at _b2006-01-09 _cm _da _feng _gnju _y0 _z.b13808898 |
||
| 999 |
_c378828 _d378828 |
||