Linux® hardening in hostile networks: server security from TLS to TOR

Book Cover
Average Rating
Pub. Date:
Description Not Provided
Also in this Series
More Like This
More Details
Staff View

Grouping Information

Grouped Work ID 949c8268-f2df-f2f0-1b22-1df4291d5e95
Full title linux hardening in hostile networks server security from tls to tor
Author rankin kyle
Grouping Category book
Last Update 2018-05-22 04:36:54AM
Last Indexed 2018-06-18 04:50:50AM

Solr Details

accelerated_reader_point_value 0
accelerated_reader_reading_level 0
author Rankin, Kyle,
author_display Rankin, Kyle
detailed_location_aacpl Online - Online-only books
format_aacpl Book
format_category_aacpl Books
id 949c8268-f2df-f2f0-1b22-1df4291d5e95
isbn 9780134173337
item_details ils:a1454336|1454336-1001|Online - Online-only books|SAFARI|||1|false|false|||||On Shelf||Z-ELIBRARY||
itype_aacpl Safari Ebooks
last_indexed 2018-06-18T08:50:50.702Z
lexile_score -1
literary_form Other
literary_form_full Other
local_callnumber_aacpl SAFARI
local_time_since_added_aacpl 2 Months, Month, Quarter, Six Months, Year
owning_library_aacpl Anne Arundel County Public Library
primary_isbn 9780134173337
publishDate 2018
record_details ils:a1454336|Book|Books||English|Addison-Wesley,|[2018]|1 online resource (1 volume) : illustrations
recordtype grouped_work
Bib IdItem IdGrouped StatusStatusLocally OwnedAvailableHoldableBookableIn Library Use OnlyLibrary OwnedHoldable PTypesBookable PTypesLocal Url
ils:a1454336 1454336-1001 On Shelf On Shelf false true false false false true
series Pearson open source software development
series_with_volume Pearson open source software development|
subject_facet Computer networks -- Security measures, Computer security, Electronic books, Linux
title_display Linux® hardening in hostile networks : server security from TLS to TOR
title_full Linux® hardening in hostile networks : server security from TLS to TOR / Kyle Rankin
title_short Linux® hardening in hostile networks :
title_sub server security from TLS to TOR
topic_facet Computer networks, Computer security, Security measures