000748897 000__ 01727cam\a2200397\i\4500 000748897 001__ 748897 000748897 005__ 20210515113523.0 000748897 006__ m\\\\\o\\d\\\\\\\\ 000748897 007__ cr\cn\nnnunnun 000748897 008__ 150417t20152015inua\\\\ob\\\\001\0\eng\d 000748897 020__ $$z9781118896693 000748897 020__ $$a9781118896679$$qelectronic book 000748897 020__ $$a9781118896662$$qelectronic book 000748897 035__ $$a(CaPaEBR)ebr11041436 000748897 040__ $$aCaPaEBR$$beng$$erda$$epn$$cCaPaEBR 000748897 05014 $$aQA76.9.A25$$b.L5 2015eb 000748897 08204 $$a005.8$$223 000748897 1001_ $$aLi, Qing,$$eauthor. 000748897 24510 $$aSecurity intelligence$$h[electronic resource] :$$ba practitioner's guide to solving enterprise security challenges /$$cQing Li, Gregory Clark. 000748897 264_1 $$aIndianapolis, Indiana :$$bWiley,$$c2015. 000748897 264_4 $$c©2015 000748897 300__ $$a1 online resource (363 pages) :$$billustrations 000748897 336__ $$atext$$2rdacontent 000748897 337__ $$acomputer$$2rdamedia 000748897 338__ $$aonline resource$$2rdacarrier 000748897 504__ $$aIncludes bibliographical references and index. 000748897 506__ $$aAccess limited to authorized users. 000748897 588__ $$aDescription based on online resource; title from PDF title page (ebrary, viewed April 16, 2015). 000748897 650_0 $$aElectronic information resources$$xAccess control. 000748897 650_0 $$aComputer networks$$xSecurity measures. 000748897 650_0 $$aComputer security. 000748897 7001_ $$aClark, Gregory,$$eauthor. 000748897 77608 $$iPrint version:$$aLi, Qing.$$tSecurity intelligence : a practitioner's guide to solving enterprise security challenges.$$dIndianapolis, Indiana : Wiley, c2015 $$z9781118896693 000748897 852__ $$bebk 000748897 85640 $$3ProQuest Ebook Central Academic Complete$$uhttps://univsouthin.idm.oclc.org/login?url=http://site.ebrary.com/lib/usiricelib/Doc?id=11041436$$zOnline Access 000748897 909CO $$ooai:library.usi.edu:748897$$pGLOBAL_SET 000748897 980__ $$aEBOOK 000748897 980__ $$aBIB 000748897 982__ $$aEbook 000748897 983__ $$aOnline