|
|
|
|
| LEADER |
01636cam a2200409Ii 4500 |
| 001 |
koha001013028 |
| 003 |
OCoLC |
| 005 |
20250222065947.0 |
| 006 |
m d |
| 007 |
cr unu|||||||| |
| 008 |
181003s2018 enka o 000 0 eng d |
| 035 |
|
|
|a koha001013028
|
| 040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d N$T
|d TEFOD
|d N$T
|
| 020 |
|
|
|a 9781788624725
|q (electronic bk.)
|
| 020 |
|
|
|a 1788624726
|q (electronic bk.)
|
| 020 |
|
|
|z 9781788627252
|
| 037 |
|
|
|a CL0500000995
|b Safari Books Online
|
| 037 |
|
|
|a B13C9F25-6435-4878-849E-243BB03BD264
|b OverDrive, Inc.
|n http://www.overdrive.com
|
| 050 |
|
4 |
|a TK5105.59
|
| 072 |
|
7 |
|a COM
|x 000000
|2 bisacsh
|
| 082 |
0 |
4 |
|a 005.8
|2 23
|
| 049 |
|
|
|a MAIN
|
| 100 |
1 |
|
|a Rahalkar, Sagar,
|9 910841
|
| 245 |
1 |
0 |
|a Network vulnerability assessment
|b identify security loopholes in your network's infrastructure
|c Sagar Rahalkar.
|
| 264 |
|
1 |
|a Birmingham, UK
|b Packt Publishing,
|c 2018.
|
| 300 |
|
|
|a 1 online resource (1 volume)
|b illustrations
|
| 588 |
|
|
|a Description based on online resource; title from title page (Safari, viewed October 1, 2018).
|
| 653 |
|
7 |
|a COMPUTER SCIENCE / General
|2 bisacsh
|
| 653 |
|
0 |
|a Computer networks
|x Security measures
|x Evaluation.
|
| 653 |
|
0 |
|a Computer network protocols
|x Security measures
|x Evaluation.
|
| 655 |
|
0 |
|a EBSCO eBooks
|9 905790
|
| 655 |
|
4 |
|a Electronic books.
|9 899821
|
| 856 |
4 |
0 |
|3 EBSCOhost
|u https://www.lib.tsu.ru/limit/2023/EBSCO/1883885.pdf
|
| 856 |
|
|
|y Перейти в каталог НБ ТГУ
|u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=1013028
|
| 910 |
|
|
|a EBSCO eBooks
|
| 999 |
|
|
|c 1013028
|d 1013028
|
| 039 |
|
|
|