mdmFacet
May June 2024 Jul
MoTuWeThFrSaSu
   1  2
  3  4  5  6  7  8  9
10111213141516
17181920212223
24252627282930

Detail

EuropeanaInformation 
Raw data [ X ]
<section name="raw">
    <SEQUENTIAL>
      <record key="001" att1="001" value="164824" att2="164824">001   164824</record>
      <field key="037" subkey="x">englisch</field>
      <field key="050" subkey="x">Buch</field>
      <field key="076" subkey="">EDV</field>
      <field key="100" subkey="">Lockhart, Andrew</field>
      <field key="331" subkey="">Network Security Hacks</field>
      <field key="335" subkey="">Tips and Tools for Protecting Your Privacy</field>
      <field key="403" subkey="">2. Ed.</field>
      <field key="410" subkey="">Beijing, Cambridge, Farnham</field>
      <field key="412" subkey="">O'Reilly Media, Inc.</field>
      <field key="425" subkey="">2006, November</field>
      <field key="433" subkey="">xx, 455 pp.</field>
      <field key="451" subkey="">Hacks Series</field>
      <field key="517" subkey="c">from the Table of Contents: Credits; Preface; Unix Host Security; Windows Host Security; Privacy and Anonymity; Firewalling;</field>
      <field key="Enc" subkey="r">ypting and Securing Services; Network Security; Wireless Security; Logging; Monitoring and Trending; Secure Tunnels; Network</field>
      <field key="Int" subkey="r">usion Detection; Recovery and Response; Index;</field>
      <field key="540" subkey="">0-596-52763-2</field>
      <field key="540" subkey="">978-0-596-52763-1</field>
      <field key="544" subkey="">19032-A</field>
      <field key="700" subkey="b">005</field>
      <field key="700" subkey="b">Computer programming, programs and data</field>
      <field key="710" subkey="">Computer networks -- Security measures</field>
      <field key="710" subkey="">Internet -- Security measures</field>
      <field key="710" subkey="">Computer security</field>
    </SEQUENTIAL>
  </section>
Servertime: 0.263 sec | Clienttime: sec