005 |
|
20141130205919.0 |
020 |
|
|a9574935965 (平裝) : |c新臺幣520元
|
035 |
|
|a56874
|
040 |
|
|a空大|bchi|eCCR
|
041 |
1
|
|achi|heng
|
084 |
|
|a312.976|b8060|2ncsclt
|
095 |
|
|bLBA|c0060260|d312.976|e8060|tCCL|m0|n新台幣445元|pBOOK|fTL|v增訂八版|zB
|
095 |
|
|bKMA|cN007478|d312.976|e8060|tCCL|m0|n新台幣445元|pBOOK|fTL|v增訂八版|zB
|
095 |
|
|bPHA|cP007643|d312.976|e8060|tCCL|m0|n新台幣445元|pBOOK|fTL|v增訂八版|zB
|
095 |
|
|bTTA|cQ008287|d312.976|e8060|tCCL|m0|n新台幣445元|pBOOK|fTL|v增訂八版|zB
|
095 |
|
|bHLA|cR016968|d312.976|e8060|tCCL|m0|n新台幣445元|pBOOK|fTL|v增訂八版|zB
|
095 |
|
|bILA|cS009349|d312.976|e8060|tCCL|m0|n新台幣445元|pBOOK|fTL|v增訂八版|zB
|
095 |
|
|bKHA|cT007074|d312.976|e8060|tCCL|m0|n新台幣445元|pBOOK|fTL|v增訂八版|zB
|
095 |
|
|bCYA|cV006173|d312.976|e8060|tCCL|m0|n新台幣445元|pBOOK|fTL|v增訂八版|zB
|
095 |
|
|bTCA|cW008336|d312.976|e8060|tCCL|m0|n新台幣445元|pBOOK|fTL|v增訂八版|zB
|
095 |
|
|bHCA|cX009654|d312.976|e8060|tCCL|m0|n新台幣445元|pBOOK|fTL|v增訂八版|zB
|
095 |
|
|bT1A|cY010981|d312.976|e8060|tCCL|m0|n新台幣445元|pBOOK|fTL|v增訂八版|zB
|
100 |
1
|
|a金恩|e著
|
245 |
10
|
|a企業網路安全設計與解決方案 / |cChristopher M. King,Curtis E. Dalton,T. Ertem Osmanoglu著 ; 溫健碩譯
|
250 |
|
|a初版
|
260 |
|
|a臺北市 : |b麥格羅希爾, |c2002[民91]
|
300 |
|
|a[465]面 : |b圖,表 ; |c24公分
|
490 |
0
|
|a網路應用技術系列 ; |vNA024
|
500 |
|
|a含參考書目
|
527 |
11
|
|aSecurity architecture|edesign, deployment, and operations.|zeng
|
650 |
7
|
|a資訊安全|2csht
|
650 |
7
|
|a電腦網路|2csht
|
650 |
7
|
|a電腦結構|2csht
|
700 |
1
|
|a竇爾頓|e著
|
700 |
1
|
|a奧斯曼歐格魯|e著
|
700 |
1
|
|a溫健碩|e譯
|
750 |
1
|
|aKing,|bChristopher M.
|
752 |
1
|
|aDalton,|bCurtis E.
|
752 |
1
|
|aOsmanoglu,|bT. Ertem
|
809 |
|
|d312.976|e8060|pBOOK
|