Defensive security handbook: best practices for securing infrastructure
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Sebastopol, CA
O'Reilly
2024
|
Ausgabe: | Second edition |
Schlagworte: | |
Beschreibung: | xxiv, 334 Seiten Illustrationen |
ISBN: | 9781098127244 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049825314 | ||
003 | DE-604 | ||
005 | 20240930 | ||
007 | t| | ||
008 | 240820s2024 xx a||| |||| 00||| eng d | ||
020 | |a 9781098127244 |9 978-1-09-812724-4 | ||
035 | |a (OCoLC)1466902263 | ||
035 | |a (DE-599)BVBBV049825314 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-634 | ||
100 | 1 | |a Berlin, Amanda |e Verfasser |0 (DE-588)1136790578 |4 aut | |
245 | 1 | 0 | |a Defensive security handbook |b best practices for securing infrastructure |c Amanda Berlin, Lee Brotherston, and William F. Reyor III. |
250 | |a Second edition | ||
264 | 1 | |a Sebastopol, CA |b O'Reilly |c 2024 | |
300 | |a xxiv, 334 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Brotherston, Lee |e Verfasser |0 (DE-588)1136790446 |4 aut | |
700 | 1 | |a Reyor, William F. |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 9781098127206 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 9781098127213 |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035165404 |
Datensatz im Suchindex
_version_ | 1817696530197381120 |
---|---|
adam_text | |
any_adam_object | |
author | Berlin, Amanda Brotherston, Lee Reyor, William F. |
author_GND | (DE-588)1136790578 (DE-588)1136790446 |
author_facet | Berlin, Amanda Brotherston, Lee Reyor, William F. |
author_role | aut aut aut |
author_sort | Berlin, Amanda |
author_variant | a b ab l b lb w f r wf wfr |
building | Verbundindex |
bvnumber | BV049825314 |
ctrlnum | (OCoLC)1466902263 (DE-599)BVBBV049825314 |
edition | Second edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV049825314</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240930</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">240820s2024 xx a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781098127244</subfield><subfield code="9">978-1-09-812724-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1466902263</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049825314</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-634</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Berlin, Amanda</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1136790578</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Defensive security handbook</subfield><subfield code="b">best practices for securing infrastructure</subfield><subfield code="c">Amanda Berlin, Lee Brotherston, and William F. Reyor III.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sebastopol, CA</subfield><subfield code="b">O'Reilly</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxiv, 334 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Brotherston, Lee</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1136790446</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Reyor, William F.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">9781098127206</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">9781098127213</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035165404</subfield></datafield></record></collection> |
id | DE-604.BV049825314 |
illustrated | Illustrated |
indexdate | 2024-12-06T13:08:15Z |
institution | BVB |
isbn | 9781098127244 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035165404 |
oclc_num | 1466902263 |
open_access_boolean | |
owner | DE-634 |
owner_facet | DE-634 |
physical | xxiv, 334 Seiten Illustrationen |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | O'Reilly |
record_format | marc |
spelling | Berlin, Amanda Verfasser (DE-588)1136790578 aut Defensive security handbook best practices for securing infrastructure Amanda Berlin, Lee Brotherston, and William F. Reyor III. Second edition Sebastopol, CA O'Reilly 2024 xxiv, 334 Seiten Illustrationen txt rdacontent n rdamedia nc rdacarrier Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s DE-604 Brotherston, Lee Verfasser (DE-588)1136790446 aut Reyor, William F. Verfasser aut Erscheint auch als Online-Ausgabe 9781098127206 Erscheint auch als Online-Ausgabe 9781098127213 |
spellingShingle | Berlin, Amanda Brotherston, Lee Reyor, William F. Defensive security handbook best practices for securing infrastructure Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4274324-2 |
title | Defensive security handbook best practices for securing infrastructure |
title_auth | Defensive security handbook best practices for securing infrastructure |
title_exact_search | Defensive security handbook best practices for securing infrastructure |
title_full | Defensive security handbook best practices for securing infrastructure Amanda Berlin, Lee Brotherston, and William F. Reyor III. |
title_fullStr | Defensive security handbook best practices for securing infrastructure Amanda Berlin, Lee Brotherston, and William F. Reyor III. |
title_full_unstemmed | Defensive security handbook best practices for securing infrastructure Amanda Berlin, Lee Brotherston, and William F. Reyor III. |
title_short | Defensive security handbook |
title_sort | defensive security handbook best practices for securing infrastructure |
title_sub | best practices for securing infrastructure |
topic | Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computersicherheit |
work_keys_str_mv | AT berlinamanda defensivesecurityhandbookbestpracticesforsecuringinfrastructure AT brotherstonlee defensivesecurityhandbookbestpracticesforsecuringinfrastructure AT reyorwilliamf defensivesecurityhandbookbestpracticesforsecuringinfrastructure |