A partir de cette page vous pouvez :
Retourner au premier écran avec les catégories... |
RĂ©sultat de la recherche
14 résultat(s) recherche sur le mot-clé 'Pro spring security''
Affiner la recherche
Pro spring security / Carlo Scarioni
Titre : Pro spring security : Securing Spring Framework 5 and Boot 2-based Java Applications Type de document : texte imprimé Auteurs : Carlo Scarioni, Auteur; Massimo Nardone, Auteur Mention d'édition : Second Edition Editeur : [New York] : Apress Année de publication : 2019 Importance : 410 Page Présentation : ill (graph...) Format : 26cm ISBN/ISSN/EAN : 978-1-484-25051-8 Langues : Anglais (eng) Catégories : 005.3 Mobile Application Development Mots-clés : Pro spring security' ' Index. décimale : 005.3 Pro spring security [texte imprimé] : Securing Spring Framework 5 and Boot 2-based Java Applications / Carlo Scarioni, Auteur; Massimo Nardone, Auteur . - Second Edition . - [S.l.] : [New York] : Apress, 2019 . - 410 Page : ill (graph...) ; 26cm.
ISBN : 978-1-484-25051-8
Langues : Anglais (eng)
Catégories : 005.3 Mobile Application Development Mots-clés : Pro spring security' ' Index. décimale : 005.3 Exemplaires
Code-barres Cote Support Localisation Section DisponibilitĂ© 0-120355 005.3 SCA Livre Library Repository Exclu du prĂȘt AI and Machine Learning for Network and Security Management / Yulei Wu
Titre : AI and Machine Learning for Network and Security Management Type de document : texte imprimé Auteurs : Yulei Wu, Auteur Editeur : Wiley-IEEE Press Année de publication : 2023 Importance : xix, 263 pages Présentation : illustrations (graph), diagram Format : 24 cm ISBN/ISSN/EAN : 978-1-11-983587-5 Langues : Anglais (eng) Catégories : 006 Special computer methods Mots-clés : AI and Machine Learning for Network and Security Management Index. décimale : 006.76 Résumé : Al and Machine Learning for Network and Security Management covers a range of key topics of
network automation for network and security management, including resource allocation and
scheduling, network planning and routing, encrypted traffic classification, anomaly detection,
and security operations. In addition, the authors introduce their large-scale intelligent network
management and operation system and elaborate on how the aforementioned areas can be
integrated into this system, plus how the network service can benefit.AI and Machine Learning for Network and Security Management [texte imprimé] / Yulei Wu, Auteur . - [S.l.] : Wiley-IEEE Press, 2023 . - xix, 263 pages : illustrations (graph), diagram ; 24 cm.
ISBN : 978-1-11-983587-5
Langues : Anglais (eng)
Catégories : 006 Special computer methods Mots-clés : AI and Machine Learning for Network and Security Management Index. décimale : 006.76 Résumé : Al and Machine Learning for Network and Security Management covers a range of key topics of
network automation for network and security management, including resource allocation and
scheduling, network planning and routing, encrypted traffic classification, anomaly detection,
and security operations. In addition, the authors introduce their large-scale intelligent network
management and operation system and elaborate on how the aforementioned areas can be
integrated into this system, plus how the network service can benefit.Exemplaires
Code-barres Cote Support Localisation Section DisponibilitĂ© 125094 006.76 WUY Livre Library Repository Exclu du prĂȘt CCNA Cisco certified network associate security study guide (Exam 640-553) / DEAL, Richard A.
Titre : CCNA Cisco certified network associate security study guide (Exam 640-553) Type de document : texte imprimé Auteurs : DEAL, Richard A., Auteur Editeur : New York : McGraw-Hill Année de publication : 2009 Importance : xl, 791 p. Présentation : ill. Format : 24cm. + 1 CD-ROM (4 3/4 in.) ISBN/ISSN/EAN : 978-0-07-162519-7 Note générale : Includes index. Langues : Anglais (eng) Catégories : 000 Généralités:Data security Mots-clés : Computer networks--Security measures--Examinations--Study guides.
Computer networks--Security measures--Problems, exercises, etc.
Telecommunications engineers--Certification.Index. décimale : 005.8 Résumé : Accompanying CD-ROM has practice MasterExam, a link for online registration and download of a bonus MasterExam, the entire book in electronic format, and Adobe Acrobat Reader software. CCNA Cisco certified network associate security study guide (Exam 640-553) [texte imprimé] / DEAL, Richard A., Auteur . - New York : McGraw-Hill, 2009 . - xl, 791 p. : ill. ; 24cm. + 1 CD-ROM (4 3/4 in.).
ISBN : 978-0-07-162519-7
Includes index.
Langues : Anglais (eng)
Catégories : 000 Généralités:Data security Mots-clés : Computer networks--Security measures--Examinations--Study guides.
Computer networks--Security measures--Problems, exercises, etc.
Telecommunications engineers--Certification.Index. décimale : 005.8 Résumé : Accompanying CD-ROM has practice MasterExam, a link for online registration and download of a bonus MasterExam, the entire book in electronic format, and Adobe Acrobat Reader software. Exemplaires
Code-barres Cote Support Localisation Section DisponibilitĂ© 115659 005.8 DEA Livre Library Repository Exclu du prĂȘt Cryptography and network security / William STALLINGS
Titre : Cryptography and network security : principles and practice Type de document : texte imprimé Auteurs : William STALLINGS, Auteur Editeur : Boston : Pearson Année de publication : 2014 Importance : 751 pages : illustrations Présentation : ill,. Format : 24 cm ISBN/ISSN/EAN : 978-0-273-79335-9 Note générale : Includes bibliographical references (pages 710-719) and index. Langues : Anglais (eng) Catégories : 000 Généralités:Programmation, programmes, organisation des données, logiciel Mots-clés : Computer networks--Security measures.
Data encryption (Computer science)
Coding theory.
Computer security.Index. décimale : 005.8 Cryptography and network security [texte imprimé] : principles and practice / William STALLINGS, Auteur . - Boston : Pearson, 2014 . - 751 pages : illustrations : ill,. ; 24 cm.
ISBN : 978-0-273-79335-9
Includes bibliographical references (pages 710-719) and index.
Langues : Anglais (eng)RĂ©servation
RĂ©server ce document
Exemplaires
Code-barres Cote Support Localisation Section DisponibilitĂ© 114702 005.8 STA Livre Library Repository Exclu du prĂȘt 114703 005.8 STA-1 Livre Library Shelf Disponible 114704 005.8 STA-2 Livre Library Shelf Disponible 114711 005.8 STA-3 Livre Library Shelf Disponible Cryptography and network security : principles and practice / William STALLINGS
Titre : Cryptography and network security : principles and practice Type de document : texte imprimé Auteurs : William STALLINGS, Auteur; Mohit P. Tahiliani, Auteur Mention d'édition : Fourth Edition Editeur : Pearson Education International Année de publication : 2006 Importance : 680 Pages Présentation : ill Format : 24cm ISBN/ISSN/EAN : 978-0-13-202322-1 Langues : Anglais (eng) Catégories : 005.8 Public key infrastructure (Computer security) Mots-clés : Cryptography and network security : principles and practice' ' Index. décimale : 005.8 Cryptography and network security : principles and practice [texte imprimé] / William STALLINGS, Auteur; Mohit P. Tahiliani, Auteur . - Fourth Edition . - [S.l.] : Pearson Education International, 2006 . - 680 Pages : ill ; 24cm.
ISBN : 978-0-13-202322-1
Langues : Anglais (eng)
Catégories : 005.8 Public key infrastructure (Computer security) Mots-clés : Cryptography and network security : principles and practice' ' Index. décimale : 005.8 Exemplaires
Code-barres Cote Support Localisation Section DisponibilitĂ© 0-120338 005.8 STA Livre Library Shelf Exclu du prĂȘt Machine learning security principles / John Paul Mueller
Titre : Machine learning security principles : use various methods to keep data, networks, users, and applications safe from prying eyes Type de document : texte imprimé Auteurs : John Paul Mueller, Auteur Mention d'édition : First Edition Editeur : Birmingham : Packt Publishing Année de publication : 2022 Importance : xxiv, 425 pages Présentation : illustrations Format : 23 cm ISBN/ISSN/EAN : 978-1-8046-1885-1 Langues : Anglais (eng) Catégories : 000 Généralités:006.31 Machine Learning Mots-clés : Machine learning security principles Index. décimale : 006.31 Machine learning security principles [texte imprimé] : use various methods to keep data, networks, users, and applications safe from prying eyes / John Paul Mueller, Auteur . - First Edition . - Birmingham : Packt Publishing, 2022 . - xxiv, 425 pages : illustrations ; 23 cm.
ISBN : 978-1-8046-1885-1
Langues : Anglais (eng)
Catégories : 000 Généralités:006.31 Machine Learning Mots-clés : Machine learning security principles Index. décimale : 006.31 Exemplaires
Code-barres Cote Support Localisation Section DisponibilitĂ© 125009 006.31 MUE Livre Library Repository Exclu du prĂȘt Network security / Radia Perlman
Titre : Network security Type de document : texte imprimé Auteurs : Radia Perlman, Auteur Mention d'édition : Third edition Editeur : Pearson Education, Inc Année de publication : 2023 Importance : xx, 455, G15, M26, B14, I10 pages Présentation : illustrations Format : 24 cm ISBN/ISSN/EAN : 978-0-13-664360-9 Langues : Anglais (eng) Catégories : 005.8 Data security Mots-clés : Network security Index. décimale : 005.8 Résumé : Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important. This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. Network Security, Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level. Coverage includes * Network security protocol and cryptography basics * Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3) * First-generation public key algorithms (RSA, Diffie-Hellman, ECC) * How quantum computers work, and why they threaten the first-generation public key algorithms * Quantum computers: how they work, and why they threaten the first-generation public key algorithms * Multi-factor authentication of people * Real-time communication (SSL/TLS, SSH, IPsec) * New applications (electronic money, blockchains) * New cryptographic techniques (homomorphic encryption, secure multiparty computation) Network security [texte imprimé] / Radia Perlman, Auteur . - Third edition . - [S.l.] : Pearson Education, Inc, 2023 . - xx, 455, G15, M26, B14, I10 pages : illustrations ; 24 cm.
ISBN : 978-0-13-664360-9
Langues : Anglais (eng)
Catégories : 005.8 Data security Mots-clés : Network security Index. décimale : 005.8 Résumé : Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important. This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. Network Security, Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level. Coverage includes * Network security protocol and cryptography basics * Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3) * First-generation public key algorithms (RSA, Diffie-Hellman, ECC) * How quantum computers work, and why they threaten the first-generation public key algorithms * Quantum computers: how they work, and why they threaten the first-generation public key algorithms * Multi-factor authentication of people * Real-time communication (SSL/TLS, SSH, IPsec) * New applications (electronic money, blockchains) * New cryptographic techniques (homomorphic encryption, secure multiparty computation) Exemplaires
Code-barres Cote Support Localisation Section DisponibilitĂ© 125082 005.8 PER Livre Library Repository Exclu du prĂȘt Oracle database 12c security cookbook / Zoran. Pavlović
Titre : Oracle database 12c security cookbook Type de document : texte imprimĂ© Auteurs : Zoran. Pavlović, Auteur Editeur : Birmingham, U.K. : Packt Publishing Ltd. AnnĂ©e de publication : 2016 Importance : 362 Pages PrĂ©sentation : ill,... ISBN/ISSN/EAN : 978-1-7821-7212-3 Langues : Anglais (eng) CatĂ©gories : 000 GĂ©nĂ©ralitĂ©s:005.133 maĂźtriser le langage Mots-clĂ©s : Oracle database 12c security cookbook Index. dĂ©cimale : 005.7565 Oracle database 12c security cookbook [texte imprimĂ©] / Zoran. Pavlović, Auteur . - Birmingham, U.K. : Packt Publishing Ltd., 2016 . - 362 Pages : ill,....
ISBN : 978-1-7821-7212-3
Langues : Anglais (eng)
Catégories : 000 Généralités:005.133 maßtriser le langage Mots-clés : Oracle database 12c security cookbook Index. décimale : 005.7565 Exemplaires
Code-barres Cote Support Localisation Section DisponibilitĂ© 0-118847 005.7565 PAV Livre Library Repository Exclu du prĂȘt Principles of information security / Whitman Michael E.
Titre : Principles of information security Type de document : texte imprimé Auteurs : Whitman Michael E., Auteur; Herbert J. MATTORD, Auteur Editeur : Cengage Learning Année de publication : 2016 Importance : 692p Présentation : ill Format : 23cm ISBN/ISSN/EAN : 978-1-285-44836-7 Langues : Anglais (eng) Catégories : 005.8 Public key infrastructure (Computer security) Mots-clés : Security information,.. Index. décimale : 005.8 Principles of information security [texte imprimé] / Whitman Michael E., Auteur; Herbert J. MATTORD, Auteur . - [S.l.] : Cengage Learning, 2016 . - 692p : ill ; 23cm.
ISBN : 978-1-285-44836-7
Langues : Anglais (eng)
Catégories : 005.8 Public key infrastructure (Computer security) Mots-clés : Security information,.. Index. décimale : 005.8 Exemplaires
Code-barres Cote Support Localisation Section DisponibilitĂ© 116080 005.8 WHI Livre Library Repository Exclu du prĂȘt Principles of information security / Whitman Michael E.
Titre : Principles of information security Type de document : texte imprimé Auteurs : Whitman Michael E., Auteur; Herbert J., Auteur Editeur : Boston, MA : Course Technology Année de publication : 2012 Importance : xxxi, 617 p. : ill. Format : 24 cm ISBN/ISSN/EAN : 978-1-11-113821-9 Note générale : Includes bibliographical references and index. Langues : Anglais (eng) Mots-clés : Computer networks--Security measures.
Computer security.Index. décimale : 005.8 Principles of information security [texte imprimé] / Whitman Michael E., Auteur; Herbert J., Auteur . - [S.l.] : Boston, MA : Course Technology, 2012 . - xxxi, 617 p. : ill. ; 24 cm.
ISBN : 978-1-11-113821-9
Includes bibliographical references and index.
Langues : Anglais (eng)
Mots-clés : Computer networks--Security measures.
Computer security.Index. décimale : 005.8 Exemplaires
Code-barres Cote Support Localisation Section DisponibilitĂ© 114892 005.8 WHI Livre Library Repository Exclu du prĂȘt Security engineering / Ross Anderson
Titre : Security engineering : a guide to building dependable distributed systems Type de document : texte imprimé Auteurs : Ross Anderson, Auteur Mention d'édition : Third Edition Editeur : John Wiley & Sons, Ins., Indianapolis, Indiana Année de publication : 2020 Importance : xxxv 1182 Pages Présentation : illustrations Black and White Format : 24 Cm ISBN/ISSN/EAN : 978-1-11-964278-7 Langues : Anglais (eng) Langues originales : Anglais (eng) Catégories : 005.1 Security Engineering Mots-clés : Security Engineering, A guide to Building Dependable Distributed System Index. décimale : 005.1 Résumé : In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack. This book became a best-seller in 2001 and helped establish the discipline of security engineering. By the second edition in 2008, underground dark markets had let the bad guys specialize and scale up; attacks were increasingly on users rather than on technology. The book repeated its success by showing how security engineers can focus on usability. Now the third edition brings it up to date for 2020. As people now go online from phones more than laptops, most servers are in the cloud, online advertising drives the Internet and social networks have taken over much human interaction, many patterns of crime and abuse are the same, but the methods have evolved. Ross Anderson explores what security engineering means in 2020. The third edition of Security Engineering ends with a grand challenge: sustainable security. As we build ever more software and connectivity into safety-critical durable goods like cars and medical devices, how do we design systems we can maintain and defend for decades? Or will everything in the world need monthly software upgrades, and become unsafe once they stop? Security engineering [texte imprimé] : a guide to building dependable distributed systems / Ross Anderson, Auteur . - Third Edition . - [S.l.] : John Wiley & Sons, Ins., Indianapolis, Indiana, 2020 . - xxxv 1182 Pages : illustrations Black and White ; 24 Cm.
ISBN : 978-1-11-964278-7
Langues : Anglais (eng) Langues originales : Anglais (eng)
Catégories : 005.1 Security Engineering Mots-clés : Security Engineering, A guide to Building Dependable Distributed System Index. décimale : 005.1 Résumé : In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack. This book became a best-seller in 2001 and helped establish the discipline of security engineering. By the second edition in 2008, underground dark markets had let the bad guys specialize and scale up; attacks were increasingly on users rather than on technology. The book repeated its success by showing how security engineers can focus on usability. Now the third edition brings it up to date for 2020. As people now go online from phones more than laptops, most servers are in the cloud, online advertising drives the Internet and social networks have taken over much human interaction, many patterns of crime and abuse are the same, but the methods have evolved. Ross Anderson explores what security engineering means in 2020. The third edition of Security Engineering ends with a grand challenge: sustainable security. As we build ever more software and connectivity into safety-critical durable goods like cars and medical devices, how do we design systems we can maintain and defend for decades? Or will everything in the world need monthly software upgrades, and become unsafe once they stop? Exemplaires
Code-barres Cote Support Localisation Section DisponibilitĂ© 125949 005.1 AND Livre Library Repository Exclu du prĂȘt The tangled Web / ZALEWSKI, Michal.
Titre : The tangled Web : a guide to securing modern Web applications Type de document : texte imprimé Auteurs : ZALEWSKI, Michal., Auteur Editeur : San Francisco : No Starch Press Année de publication : 2012 Importance : xix, 299 p Présentation : ill. Format : 24cm. ISBN/ISSN/EAN : 978-1-593-27388-0 Note générale : Includes bibliographical references (p. 267-282) and index. Langues : Anglais (eng) Catégories : 000 Généralités:Data security Mots-clés : Computer networks--Security measures.
Browsers (Computer programs)
Computer security.
COMPUTERS / Internet / Security.
COMPUTERS / Security / Viruses.
COMPUTERS / Networking / General.
COMPUTERS / Networking / Network Protocols.
COMPUTERS / Security / General.
COMPUTERS / Security / Cryptography.
COMPUTERS / Networking / Security.
COMPUTERS / Web / Web Programming.
COMPUTERS / Web / Browsers.Index. décimale : 005.8 Résumé : "'Thorough and comprehensive coverage from one of the foremost experts in browser security.' --Tavis Ormandy, Google Inc. Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape.In The Tangled Web, Michal Zalewski, one of the world's top browser security experts, offers a compelling narrative that explains exactly how browsers work and why they're fundamentally insecure. Rather than dispense simplistic advice on vulnerabilities, Zalewski examines the entire browser security model, revealing weak points and providing crucial information for shoring up web application security. You'll learn how to: Perform common but surprisingly complex tasks such as URL parsing and HTML sanitization Use modern security features like Strict Transport Security, CSP, and CORS Leverage many variants of the same-origin policy to safely compartmentalize complex web applications and protect user credentials in case of XSS bugs Build mashups and embed gadgets without getting stung by the tricky frame navigation policy Embed or host user-supplied content without running into the trap of content sniffing For quick reference, "Security Engineering Cheat Sheets' at the end of each chapter offer ready solutions to problems you're most likely to encounter. With coverage extending as far as planned HTML5 features, The Tangled Web will help you create secure web applications to stand the test of time"-- Provided by publisher. The tangled Web [texte imprimé] : a guide to securing modern Web applications / ZALEWSKI, Michal., Auteur . - San Francisco : No Starch Press, 2012 . - xix, 299 p : ill. ; 24cm..
ISBN : 978-1-593-27388-0
Includes bibliographical references (p. 267-282) and index.
Langues : Anglais (eng)
Catégories : 000 Généralités:Data security Mots-clés : Computer networks--Security measures.
Browsers (Computer programs)
Computer security.
COMPUTERS / Internet / Security.
COMPUTERS / Security / Viruses.
COMPUTERS / Networking / General.
COMPUTERS / Networking / Network Protocols.
COMPUTERS / Security / General.
COMPUTERS / Security / Cryptography.
COMPUTERS / Networking / Security.
COMPUTERS / Web / Web Programming.
COMPUTERS / Web / Browsers.Index. décimale : 005.8 Résumé : "'Thorough and comprehensive coverage from one of the foremost experts in browser security.' --Tavis Ormandy, Google Inc. Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape.In The Tangled Web, Michal Zalewski, one of the world's top browser security experts, offers a compelling narrative that explains exactly how browsers work and why they're fundamentally insecure. Rather than dispense simplistic advice on vulnerabilities, Zalewski examines the entire browser security model, revealing weak points and providing crucial information for shoring up web application security. You'll learn how to: Perform common but surprisingly complex tasks such as URL parsing and HTML sanitization Use modern security features like Strict Transport Security, CSP, and CORS Leverage many variants of the same-origin policy to safely compartmentalize complex web applications and protect user credentials in case of XSS bugs Build mashups and embed gadgets without getting stung by the tricky frame navigation policy Embed or host user-supplied content without running into the trap of content sniffing For quick reference, "Security Engineering Cheat Sheets' at the end of each chapter offer ready solutions to problems you're most likely to encounter. With coverage extending as far as planned HTML5 features, The Tangled Web will help you create secure web applications to stand the test of time"-- Provided by publisher. Exemplaires
Code-barres Cote Support Localisation Section DisponibilitĂ© 115717 005.8 ZAL Livre Library Repository Exclu du prĂȘt Urban transportation and logistics : health, safety, and security concerns / Eiichi. Taniguchi
Titre : Urban transportation and logistics : health, safety, and security concerns Type de document : texte imprimé Auteurs : Eiichi. Taniguchi, Auteur; Tien Fang. Fwa, Auteur; Russell G. Thompson, Auteur Editeur : New York : CRC Press Année de publication : 2014 Importance : 267 Pages Présentation : ill,... Format : 25cm ISBN/ISSN/EAN : 978-1-482-20909-9 Langues : Anglais (eng) Catégories : 300 Sciences sociales:363 Autres problÚmes et services sociaux Mots-clés : Urban transportation and logistics : health, safety, and security concerns Index. décimale : 363.125091732 Urban transportation and logistics : health, safety, and security concerns [texte imprimé] / Eiichi. Taniguchi, Auteur; Tien Fang. Fwa, Auteur; Russell G. Thompson, Auteur . - New York : CRC Press, 2014 . - 267 Pages : ill,... ; 25cm.
ISBN : 978-1-482-20909-9
Langues : Anglais (eng)
Catégories : 300 Sciences sociales:363 Autres problÚmes et services sociaux Mots-clés : Urban transportation and logistics : health, safety, and security concerns Index. décimale : 363.125091732 Exemplaires
Code-barres Cote Support Localisation Section DisponibilitĂ© 0-119764 363.125091732 TAN Livre Library Repository Exclu du prĂȘt 5th ed.. Network Security Essentials / William STALLINGS
Titre : Network Security Essentials : Applications and standards Type de document : texte imprimé Auteurs : William STALLINGS, Auteur Mention d'édition : 5th éd... Editeur : Boston : Pearson Année de publication : 2014 Importance : xvii, 442 pages Présentation : ill,. Format : 24.5 cm ISBN/ISSN/EAN : 978-0-273-79336-6 Note générale : Includes bibliographical references (pages 405-415) and index. Langues : Anglais (eng) Catégories : 000 Généralités:Programmation, programmes, organisation des données, logiciel Mots-clés : Computer networks--Security measures.
Computer securityIndex. décimale : 005.8 Network Security Essentials [texte imprimé] : Applications and standards / William STALLINGS, Auteur . - 5th éd... . - Boston : Pearson, 2014 . - xvii, 442 pages : ill,. ; 24.5 cm.
ISBN : 978-0-273-79336-6
Includes bibliographical references (pages 405-415) and index.
Langues : Anglais (eng)
Catégories : 000 Généralités:Programmation, programmes, organisation des données, logiciel Mots-clés : Computer networks--Security measures.
Computer securityIndex. décimale : 005.8 Réservation
RĂ©server ce document
Exemplaires
Code-barres Cote Support Localisation Section DisponibilitĂ© 114686 005.8 STA Livre Library Repository Exclu du prĂȘt 114687 005.8 STA-1 Livre Library Shelf Disponible 114688 005.8 STA-2 Livre Library Shelf Disponible 114689 005.8 STA-3 Livre Library Shelf Disponible