Next-generation firewalls for dummies [Learn to: differentiate between "good" and "bad" applications, identify evasive techniques used by applications, implement effective application and network controls ; Making everything easier!]

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Miller, Lawrence C. (VerfasserIn)
Format: Buch
Sprache:English
Veröffentlicht: Hoboken, NJ Wiley 2011
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 c 4500
001 BV041717070
003 DE-604
005 20140321
007 t|
008 140304s2011 xx ad|| |||| 00||| eng d
020 |z 9780470939550  |9 978-0-470-93955-0 
020 |z 0470939559  |9 0-470-93955-9 
035 |a (OCoLC)876416350 
035 |a (DE-599)BVBBV041717070 
040 |a DE-604  |b ger  |e rakwb 
041 0 |a eng 
049 |a DE-898 
084 |a ST 277  |0 (DE-625)143643:  |2 rvk 
100 1 |a Miller, Lawrence C.  |e Verfasser  |4 aut 
245 1 0 |a Next-generation firewalls for dummies  |b [Learn to: differentiate between "good" and "bad" applications, identify evasive techniques used by applications, implement effective application and network controls ; Making everything easier!]  |c Lawrence C. Miller 
264 1 |a Hoboken, NJ  |b Wiley  |c 2011 
300 |a 68 S.  |b Ill., graph. Darst.  |c 21 cm 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
650 4 |a Firewalls (Computer security) 
943 1 |a oai:aleph.bib-bvb.de:BVB01-027164138 

Datensatz im Suchindex

_version_ 1819293015059988480
any_adam_object
author Miller, Lawrence C.
author_facet Miller, Lawrence C.
author_role aut
author_sort Miller, Lawrence C.
author_variant l c m lc lcm
building Verbundindex
bvnumber BV041717070
classification_rvk ST 277
ctrlnum (OCoLC)876416350
(DE-599)BVBBV041717070
discipline Informatik
format Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01056nam a2200289 c 4500</leader><controlfield tag="001">BV041717070</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140321 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">140304s2011 xx ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780470939550</subfield><subfield code="9">978-0-470-93955-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0470939559</subfield><subfield code="9">0-470-93955-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)876416350</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041717070</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-898</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Miller, Lawrence C.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Next-generation firewalls for dummies</subfield><subfield code="b">[Learn to: differentiate between "good" and "bad" applications, identify evasive techniques used by applications, implement effective application and network controls ; Making everything easier!]</subfield><subfield code="c">Lawrence C. Miller</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">Wiley</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">68 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">21 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Firewalls (Computer security)</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027164138</subfield></datafield></record></collection>
id DE-604.BV041717070
illustrated Illustrated
indexdate 2024-12-24T04:03:42Z
institution BVB
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-027164138
oclc_num 876416350
open_access_boolean
owner DE-898
DE-BY-UBR
owner_facet DE-898
DE-BY-UBR
physical 68 S. Ill., graph. Darst. 21 cm
publishDate 2011
publishDateSearch 2011
publishDateSort 2011
publisher Wiley
record_format marc
spelling Miller, Lawrence C. Verfasser aut
Next-generation firewalls for dummies [Learn to: differentiate between "good" and "bad" applications, identify evasive techniques used by applications, implement effective application and network controls ; Making everything easier!] Lawrence C. Miller
Hoboken, NJ Wiley 2011
68 S. Ill., graph. Darst. 21 cm
txt rdacontent
n rdamedia
nc rdacarrier
Firewalls (Computer security)
spellingShingle Miller, Lawrence C.
Next-generation firewalls for dummies [Learn to: differentiate between "good" and "bad" applications, identify evasive techniques used by applications, implement effective application and network controls ; Making everything easier!]
Firewalls (Computer security)
title Next-generation firewalls for dummies [Learn to: differentiate between "good" and "bad" applications, identify evasive techniques used by applications, implement effective application and network controls ; Making everything easier!]
title_auth Next-generation firewalls for dummies [Learn to: differentiate between "good" and "bad" applications, identify evasive techniques used by applications, implement effective application and network controls ; Making everything easier!]
title_exact_search Next-generation firewalls for dummies [Learn to: differentiate between "good" and "bad" applications, identify evasive techniques used by applications, implement effective application and network controls ; Making everything easier!]
title_full Next-generation firewalls for dummies [Learn to: differentiate between "good" and "bad" applications, identify evasive techniques used by applications, implement effective application and network controls ; Making everything easier!] Lawrence C. Miller
title_fullStr Next-generation firewalls for dummies [Learn to: differentiate between "good" and "bad" applications, identify evasive techniques used by applications, implement effective application and network controls ; Making everything easier!] Lawrence C. Miller
title_full_unstemmed Next-generation firewalls for dummies [Learn to: differentiate between "good" and "bad" applications, identify evasive techniques used by applications, implement effective application and network controls ; Making everything easier!] Lawrence C. Miller
title_short Next-generation firewalls for dummies
title_sort next generation firewalls for dummies learn to differentiate between good and bad applications identify evasive techniques used by applications implement effective application and network controls making everything easier
title_sub [Learn to: differentiate between "good" and "bad" applications, identify evasive techniques used by applications, implement effective application and network controls ; Making everything easier!]
topic Firewalls (Computer security)
topic_facet Firewalls (Computer security)
work_keys_str_mv AT millerlawrencec nextgenerationfirewallsfordummieslearntodifferentiatebetweengoodandbadapplicationsidentifyevasivetechniquesusedbyapplicationsimplementeffectiveapplicationandnetworkcontrolsmakingeverythingeasier