Introduction to computer networks and cybersecurity
"Draft Introduction to Computer Networking and Cybersecurity To the Student It is difficult to overstate the importance of computer networks and network security in today's world. They have become such an integral part of our existence that only a moment's reflection is required to de...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boca Raton, FL
CRC Press
[2013]
|
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047598573 | ||
003 | DE-627-1 | ||
005 | 20240228115732.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2013 xx |||||o 00| ||eng c | ||
020 | |a 9781466572140 |c electronic bk. |9 978-1-4665-7214-0 | ||
020 | |a 1466572140 |c electronic bk. |9 1-4665-7214-0 | ||
020 | |a 9781466572133 |9 978-1-4665-7213-3 | ||
035 | |a (DE-627-1)047598573 | ||
035 | |a (DE-599)KEP047598573 | ||
035 | |a (ORHE)9781466572133 | ||
035 | |a (DE-627-1)047598573 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Wu, Chwan-Hwa |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Introduction to computer networks and cybersecurity |c Chwan-Hwa (John) Wu, Auburn University, J. David Irwin, Auburn University |
264 | 1 | |a Boca Raton, FL |b CRC Press |c [2013] | |
264 | 4 | |c ©2013 | |
300 | |a 1 online resource (xlvi, 1324 pages) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references. - Print version record | ||
520 | |a "Draft Introduction to Computer Networking and Cybersecurity To the Student It is difficult to overstate the importance of computer networks and network security in today's world. They have become such an integral part of our existence that only a moment's reflection is required to delineate the many ways in which they impact essentially every aspect of our lives. For example, from a personal point of view one need only consider the impact that such things as wireless phones, texting, Facebook, Twitter, online billing and the like have had on the way we interact with one another and conduct various aspects of our lives. From a business perspective, it is clear that commerce is an ever growing global enterprise, dominated by digital transactions and conducted at unbelievable speeds via the Internet. In this environment, paper transactions are rapidly disappearing, and thus there is an expanding need for individuals who understand computer networks and their many facets and ramifications. This knowledge is becoming a prerequisite for living and working effectively in today's highly technical environment in which advances in computer networks and security technology change almost daily."-- | ||
650 | 0 | |a Computer networks | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 4 | |a Réseaux d'ordinateurs | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a COMPUTERS ; Information Technology | |
650 | 4 | |a COMPUTERS ; Networking ; General | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer networks | |
650 | 4 | |a Computer networks ; Security measures | |
700 | 1 | |a Irwin, J. David |d 1939- |e VerfasserIn |4 aut | |
776 | 1 | |z 9781466572133 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781466572133 |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781466572133/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047598573 |
---|---|
_version_ | 1818767309963001857 |
adam_text | |
any_adam_object | |
author | Wu, Chwan-Hwa Irwin, J. David 1939- |
author_facet | Wu, Chwan-Hwa Irwin, J. David 1939- |
author_role | aut aut |
author_sort | Wu, Chwan-Hwa |
author_variant | c h w chw j d i jd jdi |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047598573 (DE-599)KEP047598573 (ORHE)9781466572133 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03197cam a22005532 4500</leader><controlfield tag="001">ZDB-30-ORH-047598573</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115732.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2013 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466572140</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4665-7214-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1466572140</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4665-7214-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466572133</subfield><subfield code="9">978-1-4665-7213-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047598573</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047598573</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781466572133</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047598573</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wu, Chwan-Hwa</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Introduction to computer networks and cybersecurity</subfield><subfield code="c">Chwan-Hwa (John) Wu, Auburn University, J. David Irwin, Auburn University</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, FL</subfield><subfield code="b">CRC Press</subfield><subfield code="c">[2013]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xlvi, 1324 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Draft Introduction to Computer Networking and Cybersecurity To the Student It is difficult to overstate the importance of computer networks and network security in today's world. They have become such an integral part of our existence that only a moment's reflection is required to delineate the many ways in which they impact essentially every aspect of our lives. For example, from a personal point of view one need only consider the impact that such things as wireless phones, texting, Facebook, Twitter, online billing and the like have had on the way we interact with one another and conduct various aspects of our lives. From a business perspective, it is clear that commerce is an ever growing global enterprise, dominated by digital transactions and conducted at unbelievable speeds via the Internet. In this environment, paper transactions are rapidly disappearing, and thus there is an expanding need for individuals who understand computer networks and their many facets and ramifications. This knowledge is becoming a prerequisite for living and working effectively in today's highly technical environment in which advances in computer networks and security technology change almost daily."--</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Information Technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Irwin, J. David</subfield><subfield code="d">1939-</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781466572133</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781466572133</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781466572133/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047598573 |
illustrated | Illustrated |
indexdate | 2024-12-18T08:47:50Z |
institution | BVB |
isbn | 9781466572140 1466572140 9781466572133 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (xlvi, 1324 pages) illustrations |
psigel | ZDB-30-ORH |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | CRC Press |
record_format | marc |
spelling | Wu, Chwan-Hwa VerfasserIn aut Introduction to computer networks and cybersecurity Chwan-Hwa (John) Wu, Auburn University, J. David Irwin, Auburn University Boca Raton, FL CRC Press [2013] ©2013 1 online resource (xlvi, 1324 pages) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references. - Print version record "Draft Introduction to Computer Networking and Cybersecurity To the Student It is difficult to overstate the importance of computer networks and network security in today's world. They have become such an integral part of our existence that only a moment's reflection is required to delineate the many ways in which they impact essentially every aspect of our lives. For example, from a personal point of view one need only consider the impact that such things as wireless phones, texting, Facebook, Twitter, online billing and the like have had on the way we interact with one another and conduct various aspects of our lives. From a business perspective, it is clear that commerce is an ever growing global enterprise, dominated by digital transactions and conducted at unbelievable speeds via the Internet. In this environment, paper transactions are rapidly disappearing, and thus there is an expanding need for individuals who understand computer networks and their many facets and ramifications. This knowledge is becoming a prerequisite for living and working effectively in today's highly technical environment in which advances in computer networks and security technology change almost daily."-- Computer networks Computer networks Security measures Réseaux d'ordinateurs Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Information Technology COMPUTERS ; Networking ; General COMPUTERS ; Security ; General Computer networks ; Security measures Irwin, J. David 1939- VerfasserIn aut 9781466572133 Erscheint auch als Druck-Ausgabe 9781466572133 TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781466572133/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Wu, Chwan-Hwa Irwin, J. David 1939- Introduction to computer networks and cybersecurity Computer networks Computer networks Security measures Réseaux d'ordinateurs Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Information Technology COMPUTERS ; Networking ; General COMPUTERS ; Security ; General Computer networks ; Security measures |
title | Introduction to computer networks and cybersecurity |
title_auth | Introduction to computer networks and cybersecurity |
title_exact_search | Introduction to computer networks and cybersecurity |
title_full | Introduction to computer networks and cybersecurity Chwan-Hwa (John) Wu, Auburn University, J. David Irwin, Auburn University |
title_fullStr | Introduction to computer networks and cybersecurity Chwan-Hwa (John) Wu, Auburn University, J. David Irwin, Auburn University |
title_full_unstemmed | Introduction to computer networks and cybersecurity Chwan-Hwa (John) Wu, Auburn University, J. David Irwin, Auburn University |
title_short | Introduction to computer networks and cybersecurity |
title_sort | introduction to computer networks and cybersecurity |
topic | Computer networks Computer networks Security measures Réseaux d'ordinateurs Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Information Technology COMPUTERS ; Networking ; General COMPUTERS ; Security ; General Computer networks ; Security measures |
topic_facet | Computer networks Computer networks Security measures Réseaux d'ordinateurs Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Information Technology COMPUTERS ; Networking ; General COMPUTERS ; Security ; General Computer networks ; Security measures |
url | https://learning.oreilly.com/library/view/-/9781466572133/?ar |
work_keys_str_mv | AT wuchwanhwa introductiontocomputernetworksandcybersecurity AT irwinjdavid introductiontocomputernetworksandcybersecurity |