{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BB04220597.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BB04220597#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BB04220597.json"},"dc:title":[{"@value":"Desktop witness : the do's and don'ts of personal computer security"}],"dc:creator":"Michael A. Caloyannides","dc:publisher":[{"@value":"John Wiley"}],"dcterms:extent":"xv, 366 p.","cinii:size":"24 cm","dc:language":"eng","dc:date":"2002","cinii:ncid":"BB04220597","cinii:ownerCount":"2","foaf:maker":[{"@id":"https://ci.nii.ac.jp/author/DA16902017#entity","@type":"foaf:Person","foaf:name":[{"@value":"Caloyannides, Michael A"}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA007965","@type":"foaf:Organization","foaf:name":"関西大学 図書館","rdfs:seeAlso":{"@id":"https://www.lib.kansai-u.ac.jp/webopac/ufirdi.do?ufi_target=ctlsrh&ncid=BB04220597"}},{"@id":"https://ci.nii.ac.jp/library/FA022062","@type":"foaf:Organization","foaf:name":"千葉科学大学 図書館"}],"bibo:lccn":["2002728378"],"rdfs:seeAlso":[{"@id":"https://lccn.loc.gov/2002728378"}],"prism:publicationDate":["c2002"],"cinii:note":["Includes bibliographical references and index"],"dc:subject":["LCC:QA76.9.A25","DC21:005.8"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+security","dc:title":"Computer security"},{"@id":"https://ci.nii.ac.jp/books/search?q=Data+encryption+%28Computer+science%29","dc:title":"Data encryption (Computer science)"}],"dcterms:hasPart":[{"@id":"urn:isbn:0471486574"}]}]}