Cargando…
Defend I.T.: security by example
Autores principales: | , |
---|---|
Lenguaje: | eng |
Publicado: |
Addison-Wesley
2004
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1508613 |
_version_ | 1780927635489030144 |
---|---|
author | Gupta, Ajay Laliberte, Scott |
author_facet | Gupta, Ajay Laliberte, Scott |
author_sort | Gupta, Ajay |
collection | CERN |
id | cern-1508613 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2004 |
publisher | Addison-Wesley |
record_format | invenio |
spelling | cern-15086132021-04-21T23:42:48Zhttp://cds.cern.ch/record/1508613engGupta, AjayLaliberte, ScottDefend I.T.: security by exampleComputing and ComputersAddison-Wesleyoai:cds.cern.ch:15086132004 |
spellingShingle | Computing and Computers Gupta, Ajay Laliberte, Scott Defend I.T.: security by example |
title | Defend I.T.: security by example |
title_full | Defend I.T.: security by example |
title_fullStr | Defend I.T.: security by example |
title_full_unstemmed | Defend I.T.: security by example |
title_short | Defend I.T.: security by example |
title_sort | defend i.t.: security by example |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1508613 |
work_keys_str_mv | AT guptaajay defenditsecuritybyexample AT lalibertescott defenditsecuritybyexample |