Mac security bible:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Indianapolis, IN
Wiley Publishing, Inc.
[2010]
|
Schriftenreihe: | Bible
|
Schlagworte: | |
Online-Zugang: | FRO01 UBG01 UBY01 Volltext |
Beschreibung: | 1 Online-Ressource (xxxv, 900 Seiten) |
ISBN: | 9781118257739 9780470602966 0470602961 1282471910 9781282471917 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043390779 | ||
003 | DE-604 | ||
005 | 20200320 | ||
007 | cr|uuu---uuuuu | ||
008 | 160222s2010 |||| o||u| ||||||eng d | ||
020 | |a 9781118257739 |9 978-1-118-25773-9 | ||
020 | |a 9780470602966 |c electronic bk. |9 978-0-470-60296-6 | ||
020 | |a 0470602961 |c electronic bk. |9 0-470-60296-1 | ||
020 | |a 1282471910 |9 1-282-47191-0 | ||
020 | |a 9781282471917 |9 978-1-282-47191-7 | ||
024 | 7 | |a 10.1002/9781118257739 |2 doi | |
035 | |a (ZDB-35-WIC)ocn536338334 | ||
035 | |a (OCoLC)536338334 | ||
035 | |a (DE-599)BVBBV043390779 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-861 |a DE-706 | ||
082 | 0 | |a 005.8 | |
100 | 1 | |a Kissell, Joe |e Verfasser |4 aut | |
245 | 1 | 0 | |a Mac security bible |c Joe Kissell |
264 | 1 | |a Indianapolis, IN |b Wiley Publishing, Inc. |c [2010] | |
264 | 4 | |c © 2010 | |
300 | |a 1 Online-Ressource (xxxv, 900 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Bible | |
505 | 8 | |a Your essential, no-holds-barred guide to Mac security threats and solutions. Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely guide, he not only takes you beyond the myths, he also delves into the nitty-gritty of each potential threat, helping you weigh the pros and cons of the solutions you might choose. Learn to measure risk versus inconvenience, make informed decisions, and protect your Mac computers, your privacy, and your data with this essential guide | |
630 | 0 | 4 | |a Mac OS. |
650 | 7 | |a Mac OS. |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Macintosh (Computer) / Programming |2 fast | |
650 | 7 | |a Operating systems (Computers) |2 fast | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Operating systems (Computers) | |
650 | 4 | |a Macintosh (Computer) / Programming | |
650 | 0 | 7 | |a Macintosh |0 (DE-588)4120688-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Programmierung |0 (DE-588)4076370-5 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Macintosh |0 (DE-588)4120688-5 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Programmierung |0 (DE-588)4076370-5 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-0-470-47419-8 |
856 | 4 | 0 | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118257739 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WIC | ||
940 | 1 | |q UBG_PDA_WIC | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028809363 | ||
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118257739 |l FRO01 |p ZDB-35-WIC |q FRO_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118257739 |l UBG01 |p ZDB-35-WIC |q UBG_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118257739 |l UBY01 |p ZDB-35-WIC |q UBY_PDA_WIC_Kauf |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175965313564672 |
---|---|
any_adam_object | |
author | Kissell, Joe |
author_facet | Kissell, Joe |
author_role | aut |
author_sort | Kissell, Joe |
author_variant | j k jk |
building | Verbundindex |
bvnumber | BV043390779 |
collection | ZDB-35-WIC |
contents | Your essential, no-holds-barred guide to Mac security threats and solutions. Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely guide, he not only takes you beyond the myths, he also delves into the nitty-gritty of each potential threat, helping you weigh the pros and cons of the solutions you might choose. Learn to measure risk versus inconvenience, make informed decisions, and protect your Mac computers, your privacy, and your data with this essential guide |
ctrlnum | (ZDB-35-WIC)ocn536338334 (OCoLC)536338334 (DE-599)BVBBV043390779 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03180nmm a2200661zc 4500</leader><controlfield tag="001">BV043390779</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200320 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160222s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118257739</subfield><subfield code="9">978-1-118-25773-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470602966</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-470-60296-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470602961</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-470-60296-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1282471910</subfield><subfield code="9">1-282-47191-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781282471917</subfield><subfield code="9">978-1-282-47191-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9781118257739</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WIC)ocn536338334</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)536338334</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043390779</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-861</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kissell, Joe</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mac security bible</subfield><subfield code="c">Joe Kissell</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, IN</subfield><subfield code="b">Wiley Publishing, Inc.</subfield><subfield code="c">[2010]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxxv, 900 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Bible</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Your essential, no-holds-barred guide to Mac security threats and solutions. Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely guide, he not only takes you beyond the myths, he also delves into the nitty-gritty of each potential threat, helping you weigh the pros and cons of the solutions you might choose. Learn to measure risk versus inconvenience, make informed decisions, and protect your Mac computers, your privacy, and your data with this essential guide</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Mac OS.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Mac OS.</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Macintosh (Computer) / Programming</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Operating systems (Computers)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Macintosh (Computer) / Programming</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Macintosh</subfield><subfield code="0">(DE-588)4120688-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Programmierung</subfield><subfield code="0">(DE-588)4076370-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Macintosh</subfield><subfield code="0">(DE-588)4120688-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Programmierung</subfield><subfield code="0">(DE-588)4076370-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-0-470-47419-8</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118257739</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">UBG_PDA_WIC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028809363</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118257739</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FRO_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118257739</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBG_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118257739</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBY_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043390779 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:24:40Z |
institution | BVB |
isbn | 9781118257739 9780470602966 0470602961 1282471910 9781282471917 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028809363 |
oclc_num | 536338334 |
open_access_boolean | |
owner | DE-861 DE-706 |
owner_facet | DE-861 DE-706 |
physical | 1 Online-Ressource (xxxv, 900 Seiten) |
psigel | ZDB-35-WIC UBG_PDA_WIC ZDB-35-WIC FRO_PDA_WIC ZDB-35-WIC UBG_PDA_WIC ZDB-35-WIC UBY_PDA_WIC_Kauf |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Wiley Publishing, Inc. |
record_format | marc |
series2 | Bible |
spelling | Kissell, Joe Verfasser aut Mac security bible Joe Kissell Indianapolis, IN Wiley Publishing, Inc. [2010] © 2010 1 Online-Ressource (xxxv, 900 Seiten) txt rdacontent c rdamedia cr rdacarrier Bible Your essential, no-holds-barred guide to Mac security threats and solutions. Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely guide, he not only takes you beyond the myths, he also delves into the nitty-gritty of each potential threat, helping you weigh the pros and cons of the solutions you might choose. Learn to measure risk versus inconvenience, make informed decisions, and protect your Mac computers, your privacy, and your data with this essential guide Mac OS. Mac OS. fast Computer networks / Security measures fast Computer security fast Macintosh (Computer) / Programming fast Operating systems (Computers) fast Computer security Computer networks / Security measures Operating systems (Computers) Macintosh (Computer) / Programming Macintosh (DE-588)4120688-5 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Programmierung (DE-588)4076370-5 gnd rswk-swf Macintosh (DE-588)4120688-5 s Computersicherheit (DE-588)4274324-2 s Programmierung (DE-588)4076370-5 s DE-604 Erscheint auch als Druck-Ausgabe 978-0-470-47419-8 https://onlinelibrary.wiley.com/doi/book/10.1002/9781118257739 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Kissell, Joe Mac security bible Your essential, no-holds-barred guide to Mac security threats and solutions. Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely guide, he not only takes you beyond the myths, he also delves into the nitty-gritty of each potential threat, helping you weigh the pros and cons of the solutions you might choose. Learn to measure risk versus inconvenience, make informed decisions, and protect your Mac computers, your privacy, and your data with this essential guide Mac OS. Mac OS. fast Computer networks / Security measures fast Computer security fast Macintosh (Computer) / Programming fast Operating systems (Computers) fast Computer security Computer networks / Security measures Operating systems (Computers) Macintosh (Computer) / Programming Macintosh (DE-588)4120688-5 gnd Computersicherheit (DE-588)4274324-2 gnd Programmierung (DE-588)4076370-5 gnd |
subject_GND | (DE-588)4120688-5 (DE-588)4274324-2 (DE-588)4076370-5 |
title | Mac security bible |
title_auth | Mac security bible |
title_exact_search | Mac security bible |
title_full | Mac security bible Joe Kissell |
title_fullStr | Mac security bible Joe Kissell |
title_full_unstemmed | Mac security bible Joe Kissell |
title_short | Mac security bible |
title_sort | mac security bible |
topic | Mac OS. Mac OS. fast Computer networks / Security measures fast Computer security fast Macintosh (Computer) / Programming fast Operating systems (Computers) fast Computer security Computer networks / Security measures Operating systems (Computers) Macintosh (Computer) / Programming Macintosh (DE-588)4120688-5 gnd Computersicherheit (DE-588)4274324-2 gnd Programmierung (DE-588)4076370-5 gnd |
topic_facet | Mac OS. Computer networks / Security measures Computer security Macintosh (Computer) / Programming Operating systems (Computers) Macintosh Computersicherheit Programmierung |
url | https://onlinelibrary.wiley.com/doi/book/10.1002/9781118257739 |
work_keys_str_mv | AT kisselljoe macsecuritybible |