{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BB14671333.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BB14671333#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BB14671333.json"},"dc:title":[{"@value":"Introduction to computer networks and cybersecurity"}],"dc:creator":"Chwan-Hwa (John) Wu, J. David Irwin","dc:publisher":[{"@value":"CRC Press"}],"dcterms:extent":"xlv, 1336 p.","cinii:size":"29 cm","dc:language":"eng","dc:date":"2013","cinii:ncid":"BB14671333","cinii:ownerCount":"4","foaf:maker":[{"@id":"https://ci.nii.ac.jp/author/DA17914317#entity","@type":"foaf:Person","foaf:name":[{"@value":"Wu, Chwan-Hwa"}]},{"@id":"https://ci.nii.ac.jp/author/DA03144051#entity","@type":"foaf:Person","foaf:name":[{"@value":"Irwin, J. David"}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA001652","@type":"foaf:Organization","foaf:name":"筑波大学 附属図書館 中央図書館","rdfs:seeAlso":{"@id":"https://www.tulips.tsukuba.ac.jp/mylimedio/search/search.do?target=local&mode=comp&ncid=BB14671333"}},{"@id":"https://ci.nii.ac.jp/library/FA011973","@type":"foaf:Organization","foaf:name":"東京大学 大学院情報学環・学際情報学府","rdfs:seeAlso":{"@id":"https://opac.dl.itc.u-tokyo.ac.jp/opac/opac_openurl/?ncid=BB14671333"}},{"@id":"https://ci.nii.ac.jp/library/FA007251","@type":"foaf:Organization","foaf:name":"愛知工業大学 附属図書館","rdfs:seeAlso":{"@id":"https://opac.aitech.ac.jp/iwjs0007opc/ufirdi.do?ufi_target=ctlsrh&ncid=BB14671333"}},{"@id":"https://ci.nii.ac.jp/library/FA008935","@type":"foaf:Organization","foaf:name":"福岡工業大学 附属図書館","rdfs:seeAlso":{"@id":"https://opsv-fit.lib.fit.ac.jp/opc/recordID/catalog.bib/BB14671333"}}],"prism:publicationDate":["c2013"],"cinii:note":["Includes bibliographical references and index"],"dc:subject":["LCC:TK5105.5","DC23:005.8"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+networks","dc:title":"Computer networks"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+networks+--+Security+measures","dc:title":"Computer networks -- Security measures"},{"@id":"https://ci.nii.ac.jp/books/search?q=COMPUTERS+%2F+Information+Technology.+bisacsh","dc:title":"COMPUTERS / Information Technology. bisacsh"},{"@id":"https://ci.nii.ac.jp/books/search?q=COMPUTERS+%2F+Networking+%2F+General.+bisacsh","dc:title":"COMPUTERS / Networking / General. bisacsh"},{"@id":"https://ci.nii.ac.jp/books/search?q=COMPUTERS+%2F+Security+%2F+General.+bisacsh","dc:title":"COMPUTERS / Security / General. bisacsh"}],"dcterms:hasPart":[{"@id":"urn:isbn:9781466572133","dc:title":": hardback"}]}]}