00928cam2 22002653 450 SOBE0004412120200917093235.020140705d1923 |||||ita|0103 bagerDE<<2: >>Abbildungenvon Erich von der Bercken und August L. MayerMünchenPiper & Co.1923208, IV p.ill.29 cm001SOB00000034792001 Jacopo Tintoretto / von Erich von der Bercken und August L. MayerBercken, Erich von derAF00009955070780262MAYER, AugustAF00020491070780260ITUNISOB20200917RICAUNISOBUNISOB70082136SOBE00044121M 102 Monografia moderna SBNM700001721-2SI82136bethbUNISOBUNISOB20140707145303.020140707145325.0bethbAbbildungen1710337UNISOB01629nam 2200433Ka 450 991069528520332120240812215543.0(CKB)5470000002367885(OCoLC)70785356(OCoLC)83346312(EXLCZ)99547000000236788520060731d2006 ua 0engurbn|||||||||txtrdacontentcrdamediacrrdacarrierGuide to computer security log management recommendations of the National Institute of Standards and Technology /Murugiah Souppaya, Karen KentDraft.Gaithersburg, MD :U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology,[2006]1 volume (various pagings) digital, PDF fileNIST special publication ;800-92.Computer securityTitle from title screen (viewed on July 20, 2006)."April 2006."Includes bibliographical references (page C-1) and index.Guide to computer security log managementLogbooksManagementComputer securityStandardsUnited StatesLogbooksManagement.Computer securityStandardsSouppaya Murugiah1352527Scarfone Karen1764277National Institute of Standards and Technology (U.S.)GPOGPOBOOK9910695285203321Guide to computer security log management4205709UNINA