005 |
|
20141130205735.0 |
020 |
|
|a9867910435 (平裝) : |c新臺幣620元
|
035 |
|
|a56229
|
040 |
|
|a空大|bchi|eCCR
|
041 |
1
|
|achi|heng
|
084 |
|
|a312.976|b4104|2ncsclt
|
095 |
|
|bLBA|c0059712|d312.976|e4104|tCCL|m0|n新台幣528元|pBOOK|x一片光碟|fWSH|zB
|
095 |
|
|bKMA|cN007479|d312.976|e4104|tCCL|m0|n新台幣531元|pBOOK|x1張光碟片|fTL|v增訂八版|zB
|
095 |
|
|bPHA|cP007644|d312.976|e4104|tCCL|m0|n新台幣531元|pBOOK|x1張光碟片|fTL|v增訂八版|zB
|
095 |
|
|bTTA|cQ008288|d312.976|e4104|tCCL|m0|n新台幣531元|pBOOK|x1張光碟片|fTL|v增訂八版|zB
|
095 |
|
|bHLA|cR016969|d312.976|e4104|tCCL|m0|n新台幣531元|pBOOK|x1張光碟片|fTL|v增訂八版|zB
|
095 |
|
|bILA|cS009350|d312.976|e4104|tCCL|m0|n新台幣531元|pBOOK|x1張光碟片|fTL|v增訂八版|zB
|
095 |
|
|bKHA|cT007075|d312.976|e4104|tCCL|m0|n新台幣531元|pBOOK|x1張光碟片|fTL|v增訂八版|zB
|
095 |
|
|bCYA|cV006174|d312.976|e4104|tCCL|m0|n新台幣531元|pBOOK|x1張光碟片|fTL|v增訂八版|zB
|
095 |
|
|bTCA|cW008337|d312.976|e4104|tCCL|m0|n新台幣531元|pBOOK|x1張光碟片|fTL|v增訂八版|zB
|
095 |
|
|bHCA|cX009655|d312.976|e4104|tCCL|m0|n新台幣531元|pBOOK|x1張光碟片|fTL|v增訂八版|zB
|
095 |
|
|bT1A|cY010982|d312.976|e4104|tCCL|m0|n新台幣531元|pBOOK|x1張光碟片|fTL|v增訂八版|zB
|
100 |
1
|
|a克雷文斯基|e原著
|
245 |
10
|
|a網路安全防護手冊 / |cT. J. Klevinsky,Scott Laliberte,Ajay Gupta原著 ; 陳峰棋編譯
|
250 |
|
|a初版
|
260 |
|
|a臺北市 : |b臺灣培生教育, |c2002[民91]
|
300 |
|
|a20,611面 : |b圖,表 ; |c23公分|e1張光碟片
|
500 |
|
|a附錄:1,光碟內容;2,專家眼中二十種最嚴重的Internet安全漏洞
|
527 |
11
|
|aHack I.T.: Security through penetration testing.|zeng
|
650 |
7
|
|a資訊安全|2csht
|
650 |
7
|
|a電腦網路|x管理|2csht
|
700 |
1
|
|a拉里伯特|e原著
|
700 |
1
|
|a古普塔|e原著
|
700 |
1
|
|a陳峰棋|e編譯
|
750 |
1
|
|aKlevinsky,|bT. J.
|
752 |
1
|
|aLaliberte,|bScott
|
752 |
1
|
|aGupta,|bAjay
|
809 |
|
|d312.976|e4104|pBOOK
|