Ldr
00025nam a2200024 a 4500
245
00
$aSecurity strategies in linux platforms and applications/$cMichael H Jang
260
##
$aSudbury, Mass. :$bJones et Bartlett Learning,$c2011
300
##
$axxiii, 509 p. ;$c23 cm
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001028
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001029
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001030
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001032
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001033
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001034
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001035
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001036
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001037
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001038
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001039
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001040
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001041
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001042
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001043
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001044
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001045
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001046
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001047
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001048
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001049
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001050
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001051
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001052
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001311
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001312
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001313
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001314
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001315
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001316
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001317
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001318
852
$aFPTU HN$bTK/TTHL$jTK/TTHL001833