Detail
Raw data [ X ]
<section name="raw"> <SEQUENTIAL> <record key="001" att1="001" value="136496" att2="136496">001 136496</record> <field key="037" subkey="x">englisch</field> <field key="050" subkey="x">Buch</field> <field key="076" subkey="">EDV</field> <field key="100" subkey="b">Hayday, John (Pr.)</field> <field key="200" subkey="b">Internet Security Systems, Inc. (Ed.)</field> <field key="204" subkey="b">Microsoft Corporation (Ed.)</field> <field key="331" subkey="">Microsoft Windows 2000 Security</field> <field key="335" subkey="">Technical Reference</field> <field key="403" subkey="">1. Ed.</field> <field key="410" subkey="">Redmond, Washington</field> <field key="412" subkey="">Microsoft Press, a Division of Microsoft Corporation</field> <field key="425" subkey="">2000</field> <field key="433" subkey="">xix, 582 pp.</field> <field key="517" subkey="c">from the Table of Contents: Overview of Security Changes in Windows 2000; Windows NT 4.0 Security Review; Windows 2000 Security</field> <field key="Mod" subkey="e">l and Subsystems; Active Directory; Authentication; Cryptography and Microsoft Public Key Infrastructure; Access Control</field> <field key="Mod" subkey="e">l; Group Policy; Security Configuration and Monitoring; Auditing; Network Security; Terminal Services; Internet Information</field> <field key="Ser" subkey="v">ices 5.0 and Internet Explorer 5.0; Appendixes: Microsoft Windows 2000 Resource Kit Tools; Security Tool Set Templates;</field> <field key="540" subkey="">0-7356-0858-X</field> <field key="544" subkey="">17209-A</field> <field key="700" subkey="b">005</field> <field key="700" subkey="b">Computer programming, programs and data</field> <field key="710" subkey="">Computer security</field> <field key="710" subkey="">Microsoft Windows (Computer file)</field> </SEQUENTIAL> </section> Servertime: 0.408 sec | Clienttime:
sec
|