{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BB1263992X.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BB1263992X#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BB1263992X.json"},"dc:title":[{"@value":"Computer and information security handbook"}],"dc:creator":"edited by John R. Vacca","dc:publisher":[{"@value":"Morgan Kaufmann"}],"dcterms:extent":"xxviii, 1171 p.","cinii:size":"ill. : 29 cm","dc:language":"eng","dc:date":"2013","cinii:ncid":"BB1263992X","prism:edition":"2nd ed","cinii:ownerCount":"9","foaf:maker":[{"@id":"https://ci.nii.ac.jp/author/DA09816720#entity","@type":"foaf:Person","foaf:name":[{"@value":"Vacca, John R."}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA001492","@type":"foaf:Organization","foaf:name":"東北大学 電気通信研究所 図書室","rdfs:seeAlso":{"@id":"http://opac.library.tohoku.ac.jp/opac/opac_openurl/?ncid=BB1263992X"}},{"@id":"https://ci.nii.ac.jp/library/FA000106","@type":"foaf:Organization","foaf:name":"東京科学大学 大岡山図書館","rdfs:seeAlso":{"@id":"https://topics.libra.titech.ac.jp/recordID/catalog.bib/BB1263992X"}},{"@id":"https://ci.nii.ac.jp/library/FA016423","@type":"foaf:Organization","foaf:name":"名古屋大学 情報基盤センター 図書室","rdfs:seeAlso":{"@id":"https://m-opac.nul.nagoya-u.ac.jp/iwjs0023opc/ufirdi.do?ufi_target=ctlsrh&ncid=BB1263992X&initFlg=_RESULT_SET_NOTBIB"}},{"@id":"https://ci.nii.ac.jp/library/FA002611","@type":"foaf:Organization","foaf:name":"京都大学 附属図書館","rdfs:seeAlso":{"@id":"https://kuline.kulib.kyoto-u.ac.jp/opac/opac_openurl/?ncid=BB1263992X"}},{"@id":"https://ci.nii.ac.jp/library/FA005642","@type":"foaf:Organization","foaf:name":"拓殖大学 八王子図書館","rdfs:seeAlso":{"@id":"https://opac.lib.takushoku-u.ac.jp/opac/search?target=local&searchmode=complex&autoDetail=true&s_ncid=BB1263992X"}},{"@id":"https://ci.nii.ac.jp/library/FA007262","@type":"foaf:Organization","foaf:name":"愛知淑徳大学 図書館","rdfs:seeAlso":{"@id":"https://cat.lib.aasa.ac.jp/opac/search?autoDetail=true&searchmode=complex&target=local&s_ncid=BB1263992X"}},{"@id":"https://ci.nii.ac.jp/library/FA020001","@type":"foaf:Organization","foaf:name":"大阪工業大学 図書館 枚方分館"},{"@id":"https://ci.nii.ac.jp/library/FA009166","@type":"foaf:Organization","foaf:name":"放送大学 附属図書館","rdfs:seeAlso":{"@id":"https://libinfo.ouj.ac.jp/webopac/ufirdi.do?ufi_target=ctlsrh&ncid=BB1263992X"}},{"@id":"https://ci.nii.ac.jp/library/FA012761","@type":"foaf:Organization","foaf:name":"大阪府立中央図書館"}],"bibo:lccn":["2013020996"],"rdfs:seeAlso":[{"@id":"https://lccn.loc.gov/2013020996"}],"prism:publicationDate":["c2013"],"cinii:note":["Includes bibliographical references and index"],"dc:subject":["LCC:QA76.9.A25","DC23:005.8"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+networks+--+Security+measures","dc:title":"Computer networks -- Security measures"},{"@id":"https://ci.nii.ac.jp/books/search?q=Penetration+testing+%28Computer+security%29","dc:title":"Penetration testing (Computer security)"}],"dcterms:hasPart":[{"@id":"urn:isbn:9780123943972","dc:title":": hbk"}]}]}