| 000 | 03175cam a2200661 i 4500 | ||
|---|---|---|---|
| 005 | 20250919213643.0 | ||
| 006 | m o d | ||
| 007 | cr ||||||||||| | ||
| 008 | 171212s2015 nju ob 001 0 eng | ||
| 010 | _a2015-023847 | ||
| 020 |
_a9781119113102 _qelectronic bk. |
||
| 020 |
_a1119113105 _qelectronic bk. |
||
| 020 | _a9781118939499 (pdf) | ||
| 020 | _a1118939492 (pdf) | ||
| 020 | _a9781118939505 (epub) | ||
| 020 | _a1118939506 (epub) | ||
| 020 | _z9781118939482 (cloth) | ||
| 029 | 1 |
_aDEBBG _bBV042989352 |
|
| 029 | 1 |
_aDEBSZ _b475044207 |
|
| 029 | 1 |
_aAU@ _b000058373550 |
|
| 029 | 1 |
_aDEBBG _bBV043738000 |
|
| 035 |
_a(OCoLC)911135225 _z(OCoLC)957605744 |
||
| 035 | _a(OCoLC)ocn911135225 | ||
| 039 | 9 |
_a201902121500 _bemilda _y12-12-2017 _zhafiz _wMYUKM (1).mrc _x708 |
|
| 040 |
_aDLC _beng _erda _cDLC _dNST _dEBLCP _dYDXCP _dOCLCF _dCDX _dIDEBK _dDG1 _dVRC _dDEBSZ _dDEBBG _dYDX _dCCO |
||
| 042 | _apcc | ||
| 049 | _aMAIN | ||
| 050 | 0 | 0 | _aTK5105.59 |
| 072 | 7 |
_aCOM _x043050 _2bisacsh |
|
| 072 | 7 |
_aCOM _x053000 _2bisacsh |
|
| 082 | 0 | 0 |
_a005.8 _223 |
| 100 | 1 |
_aWang, Jie, _d1961- |
|
| 245 | 1 | 0 |
_aIntroduction to network security : _btheory and practice / _cJie Wang, Department of Computer Science at the University of Massachusetts Lowell and Zachary A. Kissel, Department of Computer Science at Merrimack College in North Andover, MA. |
| 250 | _aSecond edition. | ||
| 264 | 1 |
_aHoboken, NJ : _bWiley ; _aSingapore : _bHEP, _c2015. |
|
| 300 | _a1 online resource. | ||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bn _2rdamedia |
||
| 338 |
_aonline resource _bnc _2rdacarrier |
||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aFront Matter -- Network Security Overview -- Data Encryption Algorithms -- Public-Key Cryptography and Key Management -- Data Authentication -- Network Security Protocols in Practice -- Wireless Network Security -- Cloud Security -- Network Perimeter Security -- Intrusion Detections -- The Art of Anti-Malicious Software -- 7-bit ASCII code -- SHA-512 Constants (in Hexadecimal) -- Data Compression Using ZIP -- Base64 Encoding -- Cracking WEP Keys Using WEPCrack -- Acronyms -- Further Readings -- Index | |
| 588 | _aDescription based on print version record and CIP data provided by publisher. | ||
| 650 | 0 |
_aComputer networks _xSecurity measures. |
|
| 650 | 7 |
_aCOMPUTERS / Networking / Security _2bisacsh |
|
| 650 | 7 |
_aCOMPUTERS / Security / General _2bisacsh |
|
| 650 | 7 |
_aComputer networks _xSecurity measures. _2fast _0(OCoLC)fst00872341 |
|
| 655 | 4 | _aElectronic books. | |
| 700 | 1 | _aKissel, Zachary A. | |
| 773 | 0 | _tWiley e-books | |
| 776 | 0 | 8 |
_iPrint version: _aWang, Jie, 1961- _tIntroduction to network security _bSecond edition. _dHoboken, NJ : Wiley ; Singapore : HEP, 2015 _z9781118939482 _w(DLC) 2015021074 |
| 856 | 4 | 0 |
_uhttps://eresourcesptsl.ukm.remotexs.co/user/login?url=http://onlinelibrary.wiley.com/book/10.1002/9781119113102 _zWiley Online Library |
| 907 |
_a.b16544456 _b2022-11-22 _c2019-11-12 |
||
| 942 | _n0 | ||
| 914 | _avtls003629378 | ||
| 998 |
_ae _b2017-12-12 _cm _dz _feng _gnju _y0 _z.b16544456 |
||
| 999 |
_c691389 _d691389 |
||