008170721s2017 enka ob 001 0 eng d
■001ocn994222999
■003OCoLC
■00520180104061106.1
■006m o d
■007cr unu||||||||
■040 ▼aUMI▼beng▼erda▼epn▼cUMI▼dOCLCF▼dSTF▼dTOH▼dN$T▼dCOH
■020 ▼a9781780173436▼q(electronic bk.)
■020 ▼a1780173431▼q(electronic bk.)
■020 ▼z9781780173405
■020 ▼z1780173407
■0291 ▼aGBVCP▼b100486230X
■035 ▼a(OCoLC)994222999
■037 ▼aCL0500000877▼bSafari Books Online
■050 4▼aQA76.9.A25▼bS88 2017eb
■072 7▼aCOM▼x018000▼2bisacsh
■08204▼a005.8▼223
■049 ▼aMAIN
■1001 ▼aSutton, David▼c(Information security practitioner)▼eauthor.
■24510▼aCyber security ▼ba practitioner's guide▼dDavid Sutton
■264 1▼aSwindon, UK▼bBCS Learning & Development▼c[2017]
■264 4▼c©2017
■300 ▼a1 online resource (1 volume) ▼billustrations
■336 ▼atext▼btxt▼2rdacontent
■337 ▼acomputer▼bc▼2rdamedia
■338 ▼aonline resource▼bcr▼2rdacarrier
■588 ▼aDescription based on online resource; title from title page (Safari, viewed July 20, 2017).
■504 ▼aIncludes bibliographical references and index.
■590 ▼aeBooks on EBSCOhost▼bAll EBSCO eBooks
■650 7▼aCOMPUTERS / Data Processing.▼2bisacsh
■650 0▼aComputer security
■650 0▼aCyber intelligence (Computer security)
■650 0▼aComputer crimes
■650 7▼aComputer crimes.▼2fast▼0(OCoLC)fst00872063
■650 7▼aComputer security.▼2fast▼0(OCoLC)fst00872484
■650 7▼aCyber intelligence (Computer security)▼2fast▼0(OCoLC)fst01893401
■655 4▼aElectronic books.
■85640▼uhttp://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1501522
■938 ▼aEBSCOhost▼bEBSC▼n1501522