LEADER 01418nam 2200349 n 450 001 996386816403316 005 20221108011920.0 035 $a(CKB)1000000000611565 035 $a(EEBO)2240947603 035 $a(UnM)99873613 035 $a(EXLCZ)991000000000611565 100 $a19851120d1647 uy | 101 0 $alat 135 $aurbn||||a|bb| 200 10$aCatalogus librorum diversis Italię locis emptorum Anno Dom. 1647$b[electronic resource] $eA Georgio Thomasono Bibliopola Londinensi apud quem in Cęmiterio D. Pauli ad insigne Rosę coronatę prostant venales 210 $aLondini $cTypis Iohannis Legatt$d1647 215 $a[2], 58 p 300 $a"Biblia 1. Hebraica, 2. Samarritana, 3. Chaldaica, 4. GrƦca, 5. Syriaca, 6. Latina, 7. Arabica" (sigs G2 to end) is a bookseller's advertisement with imprint: Lutetiae Parisiorum, 1645. 300 $aAnnotation on Thomason copy: "May 21". 300 $aReproduction of the original in the British Library. 330 $aeebo-0018 606 $aCatalogs, Booksellers'$zGreat Britain$vEarly works to 1800 615 0$aCatalogs, Booksellers' 700 $aThomason$b George$fd. 1666.$01002947 801 0$bCu-RivES 801 1$bCu-RivES 801 2$bCStRLIN 801 2$bWaOLN 906 $aBOOK 912 $a996386816403316 996 $aCatalogus librorum diversis Italię locis emptorum Anno Dom. 1647$92358417 997 $aUNISA LEADER 02836nam a2200397Ii 4500 001 991003257659707536 006 m d 007 cr cn||||||||| 008 070806s2001 maua s 001 0 eng d 020 $a9781931836494 020 $a1931836493 035 $ab13656375-39ule_inst 037 $a100809:100820$bElsevier Science & Technology$nhttp://www.sciencedirect.com 040 $aOPELS$cOPELS 049 $aTEFA 082 04$a005.8$222 100 1 $aTodd, Chad.$0627584 245 10$aHack proofing Windows 2000 Server$h[electronic resource] /$cTodd Chad ; Norris L. Johnson, Jr., technical editor. 260 $aRockland, Mass. :$bSyngress Media,$cc2001. 300 $axxv, 693 p. :$bill. ;$c24 cm. 500 $aIncludes index. 520 $aThe complete, authoritative guide to protecting your Windows 2000 Network "Essential reading for your IT security organization." -Deena Joyce, Director of Information Technology and Network Security, Casino Magic Pick up a newspaper or watch the evening news and you will find a major news story involving a breech of network security. Windows 2000, as the premier network platform, has many important security features but they are difficult to configure and manage. Hack Proofing Windows 2000 Server has totally up-to-date coverage of Service Pack 2 (SP2), Kerberos and Public Key Infrastructure and also addresses newer topics such as Virtual Private Networks (VPNs), remote access and web site security. The book also has complete coverage of Internet Information Server (IIS) release 5. A great addition to the bestselling "Hack Proofing..." series Windows 2000 sales have surpassed those of Windows NT Critical topic. The security of an organization's data and communications is crucial to its survival and these topics are notoriously difficult to grasp Unrivalled web support at www.solutions@syngress.com. 533 $aElectronic reproduction.$bAmsterdam :$cElsevier Science & Technology,$d2007.$nMode of access: World Wide Web.$nSystem requirements: Web browser.$nTitle from title screen (viewed on Aug. 2, 2007).$nAccess may be restricted to users at subscribing institutions. 630 00$aMicrosoft Windows (Computer file) 650 0$aComputer security. 650 0$aComputer networks$xSecurity measures. 655 7$aElectronic books.$2local 700 1 $aJohnson, Norris L. 776 1 $cOriginal$z1931836493$z9781931836494$w(OCoLC)50317079 856 40$3Referex$uhttp://www.sciencedirect.com/science/book/9781931836494$zAn electronic book accessible through the World Wide Web; click for information 907 $a.b13656375$b24-02-22$c24-01-08 912 $a991003257659707536 994 $aC0$bTEF 996 $aHack proofing Windows 2000 Server$91213165 997 $aUNISALENTO 998 $ale029$b24-01-08$cm$dm $e-$feng$gmau$h0$i0