000 | 01478naaaa2200385uu 4500 | ||
---|---|---|---|
001 | http://library.oapen.org/handle/20.500.12657/28165 | ||
005 | 20230323120736.0 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20181001s2014 xx |||||o ||| 0|eng d | ||
020 | _a978-1-4302-6383-8 | ||
020 | _a9781430263838 | ||
040 |
_aoapen _coapen |
||
024 | 7 |
_a10.1007/978-1-4302-6383-8 _cdoi |
|
041 | 0 | _aeng | |
042 | _adc | ||
072 | 7 |
_aUY _2bicssc |
|
100 | 1 |
_aRao, Umesh Hodeghatta _4auth |
|
700 | 1 |
_aNayak, Umesha _4auth |
|
245 | 1 | 0 |
_aThe InfoSec Handbook _bAn Introduction to Information Security |
260 |
_bSpringer Nature _c2014 |
||
300 | _a1 electronic resource (392 p.) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
506 | 0 |
_aOpen Access _2star _fUnrestricted online access |
|
520 | _aComputer science | ||
540 |
_aCreative Commons _fhttps://creativecommons.org/licenses/by-nc-nd/4.0/ _2cc _4https://creativecommons.org/licenses/by-nc-nd/4.0/ |
||
546 | _aEnglish | ||
650 | 7 |
_aComputer science _2bicssc |
|
653 | _aComputer science | ||
856 | 4 | 0 |
_awww.oapen.org _uhttps://library.oapen.org/bitstream/id/1b0d12be-3874-46ae-bbfd-b1499dd52ea9/1001829.pdf _70 _zOAPEN Library: download the publication |
856 | 4 | 0 |
_awww.oapen.org _uhttp://library.oapen.org/handle/20.500.12657/28165 _70 _zOAPEN Library: description of the publication |
999 |
_c6195 _d6195 |
||
909 |
_a4 _bDarya Shvetsova _c4 _dDarya Shvetsova |