{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BB02218313.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BB02218313#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BB02218313.json"},"dc:title":[{"@value":"Real world Linux security : intrusion prevention, detection, and recovery"}],"dc:creator":"Bob Toxen","dc:publisher":[{"@value":"Prentice Hall"}],"dcterms:extent":"xxxi, 810 p.","cinii:size":"24 cm","dc:language":"eng","dc:date":"2003","cinii:ncid":"BB02218313","prism:edition":"2nd ed","cinii:ownerCount":"1","foaf:maker":[{"@id":"https://ci.nii.ac.jp/author/DA1689117X#entity","@type":"foaf:Person","foaf:name":[{"@value":"Toxen, Bob"}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA022164","@type":"foaf:Organization","foaf:name":"兵庫県立大学 神戸情報科学学術情報館","rdfs:seeAlso":{"@id":"https://lib.laic.u-hyogo.ac.jp/opac/search?target=local&searchmode=complex&autoDetail=true&s_ncid=BB02218313"}}],"bibo:lccn":["2002035494"],"rdfs:seeAlso":[{"@id":"https://lccn.loc.gov/2002035494"}],"prism:publicationDate":["c2003"],"cinii:note":["Includes index"],"dc:subject":["LCC:QA76.76.O63","DC21:005.8"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Linux","dc:title":"Linux"},{"@id":"https://ci.nii.ac.jp/books/search?q=Operating+systems+%28Computers%29","dc:title":"Operating systems (Computers)"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+security","dc:title":"Computer security"}],"dcterms:isPartOf":[{"@id":"https://ci.nii.ac.jp/ncid/BA56030316#entity","dc:title":"Open source technology series","@type":"bibo:Book"}],"dcterms:hasPart":[{"@id":"urn:isbn:0130464562","dc:title":": pbk"}]}]}