Monitoring I Bezpiecze?stwo Sieci
Poznaj najskuteczniejsze metody obrony sieci korporacyjnych Jak stworzy?.
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | pol |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Fry, Chris Nystrom, Martin |
description | Poznaj najskuteczniejsze metody obrony sieci korporacyjnych Jak stworzy?. |
format | Book |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_ebookcentral_EBC968125</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC968125</sourcerecordid><originalsourceid>FETCH-LOGICAL-k896-e575d4ec253d27cc88ee99b5c5d025a47f25df8202b6aa1597d54dcfd5b603963</originalsourceid><addsrcrecordid>eNotjM1Kw0AURkekYmnzDnHjLjB_d2buSmyoWqi4sPsymbmR2JKpmYjQpzdoV-c7fHCuWIHWCQ1WGMvRXP-5U1IbCSDxhs2d43p6UN-yIudPzrlQ1ghl5uzuNfXdmIau_yg35YrOp47CmR7y-JPK92l3SzZr_TFTceGC7Z7Wu_ql2r49b-rHbXVwaCoCC1FTkKCitCE4R4TYQIDIJXhtWwmxdZLLxngvAG0EHUMboTFcoVELdv-fPQ3p65vyuKcmpUOgfhz8cb9e1WicmPK_wFpAOQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>book</recordtype><pqid>EBC968125</pqid></control><display><type>book</type><title>Monitoring I Bezpiecze?stwo Sieci</title><source>O'Reilly Online Learning: Academic/Public Library Edition</source><creator>Fry, Chris ; Nystrom, Martin</creator><creatorcontrib>Fry, Chris ; Nystrom, Martin</creatorcontrib><description>Poznaj najskuteczniejsze metody obrony sieci korporacyjnych Jak stworzy?.</description><edition>1</edition><identifier>ISBN: 9788324625529</identifier><identifier>ISBN: 8324625526</identifier><identifier>EISBN: 9781457167096</identifier><identifier>EISBN: 1457167093</identifier><identifier>OCLC: 880409694</identifier><language>pol</language><publisher>Sebastopol: Helion S.A</publisher><subject>Computer networks ; Security measures</subject><creationdate>2014</creationdate><tpages>226</tpages><format>226</format><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>306,780,784,786</link.rule.ids></links><search><creatorcontrib>Fry, Chris</creatorcontrib><creatorcontrib>Nystrom, Martin</creatorcontrib><title>Monitoring I Bezpiecze?stwo Sieci</title><description>Poznaj najskuteczniejsze metody obrony sieci korporacyjnych Jak stworzy?.</description><subject>Computer networks</subject><subject>Security measures</subject><isbn>9788324625529</isbn><isbn>8324625526</isbn><isbn>9781457167096</isbn><isbn>1457167093</isbn><fulltext>true</fulltext><rsrctype>book</rsrctype><creationdate>2014</creationdate><recordtype>book</recordtype><sourceid/><recordid>eNotjM1Kw0AURkekYmnzDnHjLjB_d2buSmyoWqi4sPsymbmR2JKpmYjQpzdoV-c7fHCuWIHWCQ1WGMvRXP-5U1IbCSDxhs2d43p6UN-yIudPzrlQ1ghl5uzuNfXdmIau_yg35YrOp47CmR7y-JPK92l3SzZr_TFTceGC7Z7Wu_ql2r49b-rHbXVwaCoCC1FTkKCitCE4R4TYQIDIJXhtWwmxdZLLxngvAG0EHUMboTFcoVELdv-fPQ3p65vyuKcmpUOgfhz8cb9e1WicmPK_wFpAOQ</recordid><startdate>2014</startdate><enddate>2014</enddate><creator>Fry, Chris</creator><creator>Nystrom, Martin</creator><general>Helion S.A</general><scope/></search><sort><creationdate>2014</creationdate><title>Monitoring I Bezpiecze?stwo Sieci</title><author>Fry, Chris ; Nystrom, Martin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-k896-e575d4ec253d27cc88ee99b5c5d025a47f25df8202b6aa1597d54dcfd5b603963</frbrgroupid><rsrctype>books</rsrctype><prefilter>books</prefilter><language>pol</language><creationdate>2014</creationdate><topic>Computer networks</topic><topic>Security measures</topic><toplevel>online_resources</toplevel><creatorcontrib>Fry, Chris</creatorcontrib><creatorcontrib>Nystrom, Martin</creatorcontrib></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Fry, Chris</au><au>Nystrom, Martin</au><format>book</format><genre>book</genre><ristype>BOOK</ristype><btitle>Monitoring I Bezpiecze?stwo Sieci</btitle><date>2014</date><risdate>2014</risdate><isbn>9788324625529</isbn><isbn>8324625526</isbn><eisbn>9781457167096</eisbn><eisbn>1457167093</eisbn><abstract>Poznaj najskuteczniejsze metody obrony sieci korporacyjnych Jak stworzy?.</abstract><cop>Sebastopol</cop><pub>Helion S.A</pub><oclcid>880409694</oclcid><tpages>226</tpages><edition>1</edition></addata></record> |
fulltext | fulltext |
identifier | ISBN: 9788324625529 |
ispartof | |
issn | |
language | pol |
recordid | cdi_proquest_ebookcentral_EBC968125 |
source | O'Reilly Online Learning: Academic/Public Library Edition |
subjects | Computer networks Security measures |
title | Monitoring I Bezpiecze?stwo Sieci |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-02T00%3A21%3A21IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=book&rft.btitle=Monitoring%20I%20Bezpiecze?stwo%20Sieci&rft.au=Fry,%20Chris&rft.date=2014&rft.isbn=9788324625529&rft.isbn_list=8324625526&rft_id=info:doi/&rft_dat=%3Cproquest%3EEBC968125%3C/proquest%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781457167096&rft.eisbn_list=1457167093&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC968125&rft_id=info:pmid/&rfr_iscdi=true |