Firewalls and internet security repelling the wily hacker

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Cheswick, William R. (VerfasserIn)
Format: Buch
Sprache:English
Veröffentlicht: Reading, Mass. <<[u.a.]>> Addison-Wesley 2000
Ausgabe:13th print.
Schriftenreihe:Addison-Wesley professional computing series
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 c 4500
001 BV024489337
003 DE-604
005 20090910
007 t
008 090924s2000 d||| |||| 00||| eng d
020 |a 0201633574  |9 0-201-63357-4 
035 |a (OCoLC)248331835 
035 |a (DE-599)BVBBV024489337 
040 |a DE-604  |b ger  |e rakwb 
041 0 |a eng 
049 |a DE-83 
082 0 |a 005.8 
084 |a ST 276  |0 (DE-625)143642:  |2 rvk 
100 1 |a Cheswick, William R.  |e Verfasser  |4 aut 
245 1 0 |a Firewalls and internet security  |b repelling the wily hacker  |c William R. Cheswick ; Steven M. Bellovin 
250 |a 13th print. 
264 1 |a Reading, Mass. <<[u.a.]>>  |b Addison-Wesley  |c 2000 
300 |a XIV, 306 S.  |b graph. Darst. 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
490 0 |a Addison-Wesley professional computing series 
650 0 7 |a Netzwerkverwaltung  |0 (DE-588)4314339-8  |2 gnd  |9 rswk-swf 
650 0 7 |a Computerkriminalität  |0 (DE-588)4010452-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Internet  |0 (DE-588)4308416-3  |2 gnd  |9 rswk-swf 
650 0 7 |a Rechnernetz  |0 (DE-588)4070085-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Firewall  |0 (DE-588)4386332-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Recht  |0 (DE-588)4048737-4  |2 gnd  |9 rswk-swf 
650 0 7 |a TCP/IP  |0 (DE-588)4197538-8  |2 gnd  |9 rswk-swf 
650 0 7 |a Kommunikationsprotokoll  |0 (DE-588)4128252-8  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
689 0 0 |a Rechnernetz  |0 (DE-588)4070085-9  |D s 
689 0 1 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 0 2 |a TCP/IP  |0 (DE-588)4197538-8  |D s 
689 0 |8 1\p  |5 DE-604 
689 1 0 |a Internet  |0 (DE-588)4308416-3  |D s 
689 1 1 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 1 2 |a Firewall  |0 (DE-588)4386332-2  |D s 
689 1 |8 2\p  |5 DE-604 
689 2 0 |a Internet  |0 (DE-588)4308416-3  |D s 
689 2 1 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 2 |8 3\p  |5 DE-604 
689 3 0 |a Rechnernetz  |0 (DE-588)4070085-9  |D s 
689 3 1 |a Recht  |0 (DE-588)4048737-4  |D s 
689 3 |8 4\p  |5 DE-604 
689 4 0 |a Computerkriminalität  |0 (DE-588)4010452-7  |D s 
689 4 |8 5\p  |5 DE-604 
689 5 0 |a Netzwerkverwaltung  |0 (DE-588)4314339-8  |D s 
689 5 |8 6\p  |5 DE-604 
689 6 0 |a Kommunikationsprotokoll  |0 (DE-588)4128252-8  |D s 
689 6 |8 7\p  |5 DE-604 
700 1 |a Bellovin, Steven M.  |e Sonstige  |4 oth 
999 |a oai:aleph.bib-bvb.de:BVB01-018464608 
883 1 |8 1\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
883 1 |8 2\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
883 1 |8 3\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
883 1 |8 4\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
883 1 |8 5\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
883 1 |8 6\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
883 1 |8 7\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 

Datensatz im Suchindex

_version_ 1804140482334294016
any_adam_object
author Cheswick, William R.
author_facet Cheswick, William R.
author_role aut
author_sort Cheswick, William R.
author_variant w r c wr wrc
building Verbundindex
bvnumber BV024489337
classification_rvk ST 276
ctrlnum (OCoLC)248331835
(DE-599)BVBBV024489337
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
edition 13th print.
format Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03096nam a2200757 c 4500</leader><controlfield tag="001">BV024489337</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20090910 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">090924s2000 d||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0201633574</subfield><subfield code="9">0-201-63357-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)248331835</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV024489337</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cheswick, William R.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Firewalls and internet security</subfield><subfield code="b">repelling the wily hacker</subfield><subfield code="c">William R. Cheswick ; Steven M. Bellovin</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">13th print.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Reading, Mass. &lt;&lt;[u.a.]&gt;&gt;</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">2000</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 306 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Addison-Wesley professional computing series</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerkverwaltung</subfield><subfield code="0">(DE-588)4314339-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Firewall</subfield><subfield code="0">(DE-588)4386332-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">TCP/IP</subfield><subfield code="0">(DE-588)4197538-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">TCP/IP</subfield><subfield code="0">(DE-588)4197538-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Firewall</subfield><subfield code="0">(DE-588)4386332-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="8">4\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="8">5\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="5" ind2="0"><subfield code="a">Netzwerkverwaltung</subfield><subfield code="0">(DE-588)4314339-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2=" "><subfield code="8">6\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="6" ind2="0"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="6" ind2=" "><subfield code="8">7\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bellovin, Steven M.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-018464608</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">4\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">5\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">6\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">7\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection>
id DE-604.BV024489337
illustrated Illustrated
indexdate 2024-07-09T22:00:41Z
institution BVB
isbn 0201633574
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-018464608
oclc_num 248331835
open_access_boolean
owner DE-83
owner_facet DE-83
physical XIV, 306 S. graph. Darst.
publishDate 2000
publishDateSearch 2000
publishDateSort 2000
publisher Addison-Wesley
record_format marc
series2 Addison-Wesley professional computing series
spelling Cheswick, William R. Verfasser aut
Firewalls and internet security repelling the wily hacker William R. Cheswick ; Steven M. Bellovin
13th print.
Reading, Mass. <<[u.a.]>> Addison-Wesley 2000
XIV, 306 S. graph. Darst.
txt rdacontent
n rdamedia
nc rdacarrier
Addison-Wesley professional computing series
Netzwerkverwaltung (DE-588)4314339-8 gnd rswk-swf
Computerkriminalität (DE-588)4010452-7 gnd rswk-swf
Internet (DE-588)4308416-3 gnd rswk-swf
Rechnernetz (DE-588)4070085-9 gnd rswk-swf
Firewall (DE-588)4386332-2 gnd rswk-swf
Datensicherung (DE-588)4011144-1 gnd rswk-swf
Recht (DE-588)4048737-4 gnd rswk-swf
TCP/IP (DE-588)4197538-8 gnd rswk-swf
Kommunikationsprotokoll (DE-588)4128252-8 gnd rswk-swf
Computersicherheit (DE-588)4274324-2 gnd rswk-swf
Rechnernetz (DE-588)4070085-9 s
Datensicherung (DE-588)4011144-1 s
TCP/IP (DE-588)4197538-8 s
1\p DE-604
Internet (DE-588)4308416-3 s
Computersicherheit (DE-588)4274324-2 s
Firewall (DE-588)4386332-2 s
2\p DE-604
3\p DE-604
Recht (DE-588)4048737-4 s
4\p DE-604
Computerkriminalität (DE-588)4010452-7 s
5\p DE-604
Netzwerkverwaltung (DE-588)4314339-8 s
6\p DE-604
Kommunikationsprotokoll (DE-588)4128252-8 s
7\p DE-604
Bellovin, Steven M. Sonstige oth
1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk
2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk
3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk
4\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk
5\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk
6\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk
7\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk
spellingShingle Cheswick, William R.
Firewalls and internet security repelling the wily hacker
Netzwerkverwaltung (DE-588)4314339-8 gnd
Computerkriminalität (DE-588)4010452-7 gnd
Internet (DE-588)4308416-3 gnd
Rechnernetz (DE-588)4070085-9 gnd
Firewall (DE-588)4386332-2 gnd
Datensicherung (DE-588)4011144-1 gnd
Recht (DE-588)4048737-4 gnd
TCP/IP (DE-588)4197538-8 gnd
Kommunikationsprotokoll (DE-588)4128252-8 gnd
Computersicherheit (DE-588)4274324-2 gnd
subject_GND (DE-588)4314339-8
(DE-588)4010452-7
(DE-588)4308416-3
(DE-588)4070085-9
(DE-588)4386332-2
(DE-588)4011144-1
(DE-588)4048737-4
(DE-588)4197538-8
(DE-588)4128252-8
(DE-588)4274324-2
title Firewalls and internet security repelling the wily hacker
title_auth Firewalls and internet security repelling the wily hacker
title_exact_search Firewalls and internet security repelling the wily hacker
title_full Firewalls and internet security repelling the wily hacker William R. Cheswick ; Steven M. Bellovin
title_fullStr Firewalls and internet security repelling the wily hacker William R. Cheswick ; Steven M. Bellovin
title_full_unstemmed Firewalls and internet security repelling the wily hacker William R. Cheswick ; Steven M. Bellovin
title_short Firewalls and internet security
title_sort firewalls and internet security repelling the wily hacker
title_sub repelling the wily hacker
topic Netzwerkverwaltung (DE-588)4314339-8 gnd
Computerkriminalität (DE-588)4010452-7 gnd
Internet (DE-588)4308416-3 gnd
Rechnernetz (DE-588)4070085-9 gnd
Firewall (DE-588)4386332-2 gnd
Datensicherung (DE-588)4011144-1 gnd
Recht (DE-588)4048737-4 gnd
TCP/IP (DE-588)4197538-8 gnd
Kommunikationsprotokoll (DE-588)4128252-8 gnd
Computersicherheit (DE-588)4274324-2 gnd
topic_facet Netzwerkverwaltung
Computerkriminalität
Internet
Rechnernetz
Firewall
Datensicherung
Recht
TCP/IP
Kommunikationsprotokoll
Computersicherheit
work_keys_str_mv AT cheswickwilliamr firewallsandinternetsecurityrepellingthewilyhacker
AT bellovinstevenm firewallsandinternetsecurityrepellingthewilyhacker