Network security architectures: expert guidance on designing secure networks. TX 5-959-889
Network security fundamentals IE
Document number:
V3506D324
Date of Recordation:
April 22, 2004
Entire Copyright Document:
V3506 D314-325 P1-122
Registration Number Not Verified:
TX 5-469-604 (2002)
Title:
Network security fundamentals IE / By Element K Content, LLC. TX 5-469-604 (2002)
Title appears in Document:
MultiMate skills & 2892 other titles. (Part 011 of 012)
Network security fundamentals S3
Document number:
V3506D324
Date of Recordation:
April 22, 2004
Entire Copyright Document:
V3506 D314-325 P1-122
Registration Number Not Verified:
TX 5-460-805 (2002)
Title:
Network security fundamentals S3 / By Element K Content, LLC. TX 5-460-805 (2002)
Title appears in Document:
MultiMate skills & 2892 other titles. (Part 011 of 012)
Network security secrets
Document number:
V3439D436
Date of Recordation:
August 3, 1999
Entire Copyright Document:
V3439 D436 P1-24
Registration Number Not Verified:
TX 3-626-588 (1993)
Title:
Network security secrets / By David Stang. TX 3-626-588 (1993)
Title appears in Document:
AmigaWorld official Amiga DOS 2 companion & 1,433 other titles; books & cliff notes.
Network security in a mixed environment
Document number:
V3439D436
Date of Recordation:
August 3, 1999
Entire Copyright Document:
V3439 D436 P1-24
Registration Number Not Verified:
TX 4-712-332 (1998)
Title:
Network security in a mixed environment / By Dan Blacharski. TX 4-712-332 (1998)
Title appears in Document:
AmigaWorld official Amiga DOS 2 companion & 1,433 other titles; books & cliff notes.
Network security first-step
Document number:
V3524D827
Date of Recordation:
June 21, 2005
Entire Copyright Document:
V3524 D827-828 P1-13
Registration Number Not Verified:
TX 5-971-884.
Title:
Network security first-step / by Tom Thomas. TX 5-971-884.
Title appears in Document:
Packet tracer: release 3.1 & 244 other titles (part 001 of 002)
Network security architectures: expert guidance on designing secure networks. TX 5-959-889
Document number:
V3524D827
Date of Recordation:
June 21, 2005
Entire Copyright Document:
V3524 D827-828 P1-13
Registration Number Not Verified:
TX 5-959-889.
Title:
Network security architectures: expert guidance on designing secure networks. TX 5-959-889.
Title appears in Document:
Packet tracer: release 3.1 & 244 other titles (part 001 of 002)
Network security principles and practices
Document number:
V3524D827
Date of Recordation:
June 21, 2005
Entire Copyright Document:
V3524 D827-828 P1-13
Registration Number Not Verified:
TX 5-723-958.
Title:
Network security principles and practices / by Saadat Malk. TX 5-723-958.
Title appears in Document:
Packet tracer: release 3.1 & 244 other titles (part 001 of 002)
Network security
Type of Work:
Machine-readable work or computer program
Registration Number / Date:
PA0000914402 / 1997-12-23
Date of Publication:
June 11, 1997
Date of Creation:
1997
Title:
Network security.
Basis of Claim:
New Matter: all other audio-visual material (graphics, text, narrative)
Previous Registration:
Appl. states music is preexisting.
Copyright Note:
C.O. correspondence.
Series:
Networking technologies series
Imprint:
Naperville, IL : NETG, c1997.
Description:
CD-ROM.
Copyright Claimant:
National Education Training Group, Inc.
Notes:
Course 12764.
Names:
National Education Training Group, Inc.
|
Network security monitor
Type of Work:
Machine-readable work or computer program
Registration Number / Date:
TX0001790296 / 1986-03-31
Date of Publication:
May 25, 1985
Date of Creation:
1985
Title:
Network security monitor.
Copyright Claimant:
S & S Systems, Inc.
Notes:
Cataloged from appl.
Names:
S&S Systems, Inc.
Network security involving the NetView family of products
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0002830291 / 1990-05-22
Date of Publication:
May 14, 1990
Date of Creation:
1990
Title:
Network security involving the NetView family of products.
Edition:
1st ed.
Copyright Claimant:
International Business Machines Corporation, a.a.d.: IBM Corporation
Names:
International Business Machines Corporation (34378 documents)
example document: IBM series/1 programable communications subsystem execution support, 5719-CS1
example document: IBM series/1 programable communications subsystem execution support, 5719-CS1
|
Network security using the VTAM session management exit
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0002893217 / 1990-08-27
Date of Publication:
August 17, 1990
Date of Creation:
1990
Title:
Network security using the VTAM session management exit.
Edition:
1st ed.
Copyright Claimant:
International Business Machines Corporation, a.a.d.: IBM Corporation
Names:
International Business Machines Corporation (34378 documents)
example document: IBM system/32 DFU workshop for non-programmers education guide
example document: IBM system/32 DFU workshop for non-programmers education guide
Network security in the '90s
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0003382132 / 1992-08-17
Date of Publication:
July 17, 1992
Date of Creation:
1991
Title:
Network security in the '90s : issues and solutions for managers / Thomas W. Madron.
Variant title:
Network security in the '90s : issues and solutions for managers
Copyright Claimant:
Thomas W. Madron
Names:
Thomas W. Madron
Network security processor MVS support program
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0003676252 / 1993-08-12
Date of Publication:
September 30, 1990
Date of Creation:
1990
Title:
Network security processor MVS support program.
Description:
Computer program.
Copyright Claimant:
International Business Machines Corporation a.a.d. IBM Corporation
Names:
International Business Machines Corporation (34378 documents)
example document: IBM 3790 communication system release guide
IBM Corporation (11732 documents)
example document: AS/400 manufacturing accounting and production information control system/data base (MAPICS/DB)
example document: IBM 3790 communication system release guide
IBM Corporation (11732 documents)
example document: AS/400 manufacturing accounting and production information control system/data base (MAPICS/DB)
|
Network security
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0003730673 / 1994-02-22
Date of Publication:
December 8, 1993
Date of Creation:
1993
Title:
Network security / Steven L. Shaffer, Alan R. Dimon.
Imprint:
Boston : AP Professional, c1994.
Description:
318 p.
Copyright Claimant:
Academic Press, Inc.
Names:
Steven L. Shaffer
Alan R. Dimon
Academic Press, Inc. (3683 documents)
example document: General equilibrium, growth, and trade
Alan R. Dimon
Academic Press, Inc. (3683 documents)
example document: General equilibrium, growth, and trade
|
Network security
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0004030186 / 1995-04-27
Date of Publication:
March 16, 1995
Date of Creation:
1994
Title:
Network security : private communication in a public world / Charlie Kaufman, Radia Perlman, Mike Speciner.
Series:
Prentice Hall series in computer networking and distributed systems
Imprint:
Englewood Cliffs, NJ : Prentice Hall, c1995.
Description:
504 p.
Other Title:
Prentice Hall series in computer networking and distributed systems
Copyright Claimant:
Prentice-Hall, Inc., a Simon & Schuster Company
Names:
Charlie Kaufman (34 documents)
example document: Weird
Radia Perlman
Mike Speciner
Prentice-Hall, Inc. (10137 documents)
example document: Introduction to econometrics
example document: Weird
|
Radia Perlman
Mike Speciner
Prentice-Hall, Inc. (10137 documents)
example document: Introduction to econometrics
|
Network security program product guide, version 1, release 2
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0004055805 / 1995-02-13
Date of Publication:
July 29, 1994
Date of Creation:
1994
Title:
Network security program product guide, version 1, release 2.
Edition:
2nd ed.
Basis of Claim:
New Matter: compilation of data and editing.
Previous Registration:
Prev. reg. 1993.
Copyright Note:
C.O. correspondence.
Description:
443 p.
Copyright Claimant:
International Business Machines Corporation, a.a.d.: IBM Corporation
Names:
International Business Machines Corporation (34378 documents)
example document: IBM series/1 4964 diskette unit and attachment feature
IBM Corporation (11732 documents)
example document: IBM graphics access method system product buffer order macro instructions
example document: IBM series/1 4964 diskette unit and attachment feature
IBM Corporation (11732 documents)
example document: IBM graphics access method system product buffer order macro instructions
Network security program
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0004242004 / 1996-03-14
Date of Publication:
July 31, 1994
Date of Creation:
1994
Title:
Network security program : product guide, version 1, release 2.
Edition:
2nd ed.
Basis of Claim:
New Matter: compilation & editing.
Previous Registration:
Prev. reg. 1993.
Description:
443 p.
Variant title:
Network security program : product guide, version 1, release 2
Copyright Claimant:
International Business Machines Corporation a.a.d.: IBM Corporation
Names:
International Business Machines Corporation (34378 documents)
example document: Operator's library
IBM Corporation (11732 documents)
example document: OS/2 LAN server
example document: Operator's library
IBM Corporation (11732 documents)
example document: OS/2 LAN server
Network security in a mixed environment
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0004712332 / 1998-06-29
Date of Publication:
February 2, 1998
Date of Creation:
1998
Title:
Network security in a mixed environment / Dan Blacharski.
Basis of Claim:
New Matter: entire text & compilation of CD-ROM.
Imprint:
Foster City, CA : IDG Books Worldwide, c1998.
Description:
403 p. + CD-ROM.
Copyright Claimant:
IDG Books Worldwide (employer for hire)
Names:
Dan Blacharski
IDG Books Worldwide (234 documents)
example document: 60 Minute Guide to LotusScript 3 Programming for Lotus Notes 4
IDG Books Worldwide (234 documents)
example document: 60 Minute Guide to LotusScript 3 Programming for Lotus Notes 4
|
Network security and firewalls
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0004957084 / 1999-01-15
Date of Publication:
October 10, 1998
Date of Creation:
1998
Title:
Network security and firewalls / developers, Tim Crothers and James Stanger.
Description:
1 v.
Copyright Claimant:
ProsoftTraining.com (employer for hire of Tim Crothers)
Names:
Tim Crothers
James Stanger
ProsoftTraining.com (4 documents)
example document: Advanced TCP/IP concepts and practices
|
James Stanger
|
ProsoftTraining.com (4 documents)
example document: Advanced TCP/IP concepts and practices
Network security
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0005079913 / 1999-11-26
Date of Publication:
November 8, 1999
Date of Creation:
1999
Title:
Network security : developing and implementing effective enterprise strategies / Barry Slawter.
Description:
181 p.
Copyright Claimant:
Computer Technology Research Corporation (employer for hire)
Names:
Barry Slawter
Computer Technology Research Corporation (76 documents)
example document: Convergence of wireless technology and enterprise networks
Computer Technology Research Corporation (76 documents)
example document: Convergence of wireless technology and enterprise networks
|
Network security essentials
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0005116550 / 2000-01-06
Date of Publication:
November 22, 1999
Date of Creation:
1999
Title:
Network security essentials : applications and standards / William Stallings.
Imprint:
Upper Saddle River, NJ : Prentice Hall, c2000.
Description:
366 p.
Copyright Claimant:
Prentice Hall, Inc.
Names:
William Stallings (54 documents)
example document: Local and metropolitan area networks
Prentice Hall, Inc. (1339 documents)
example document: Marketing
example document: Local and metropolitan area networks
|
Prentice Hall, Inc. (1339 documents)
example document: Marketing
|
Network security services for flows and multicasts
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0005163491 / 2000-10-11
Date of Publication:
May 26, 2000
Date of Creation:
1999
Title:
Network security services for flows and multicasts.
Rights and Permissions:
Rights and permissions info. on CORDS appl. in CO.
Description:
Computer text data.
Copyright Claimant:
Chung Kei Wong
Notes:
Electronic registration.
Authorship on Application:
entire text: Chung Kei Wong.
Names:
Chung Kei Wong
Network security
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0005384529 / 2001-05-18
Date of Publication:
February 21, 2001
Date of Creation:
2001
Title:
Network security : a beginner's guide / Eric Maiwald.
Imprint:
New York : Osborne/McGraw-Hill, c2001.
Description:
400 p.
Variant title:
Network security : a beginner's guide
Copyright Claimant:
McGraw-Hill Companies, Inc.
Names:
Eric Maiwald
McGraw-Hill Companies, Inc. (7213 documents)
example document: American ethnicity
McGraw-Hill Companies, Inc. (7213 documents)
example document: American ethnicity
|
Network security fundamentals
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0005460805 / 2002-02-04
Date of Publication:
October 24, 2001
Date of Creation:
2001
Title:
Network security fundamentals / Warren Peterson, Shrinath Tandur.
Description:
374 p. + CD-ROM.
Copyright Claimant:
Element K Content, LLC (employer for hire)
Notes:
Student manual.
Names:
Warren Peterson
Shrinath Tandur
Element K Content, LLC (509 documents)
example document: Enhance your Office 2000 documents and create graphics using PhotoDraw
|
Shrinath Tandur
Element K Content, LLC (509 documents)
example document: Enhance your Office 2000 documents and create graphics using PhotoDraw
|
Network security fundamentals
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0005469604 / 2002-02-04
Date of Publication:
October 24, 2001
Date of Creation:
2001
Title:
Network security fundamentals / Warren Peterson, Shrinath Tandur.
Edition:
Instructor's ed.
Basis of Claim:
New Matter: revisions & additions.
Imprint:
Rochester, NY : Element K Press, c2001.
Description:
358 p. + CD-ROM.
Copyright Claimant:
Element K Content, LLC (employer for hire)
Names:
Warren Peterson
Shrinath Tandur
Element K Content, LLC (509 documents)
example document: Windows Server 2003 for Window NT 4.0 administrators
Shrinath Tandur
Element K Content, LLC (509 documents)
example document: Windows Server 2003 for Window NT 4.0 administrators
Network security
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0005525629 / 2002-06-03
Date of Publication:
April 29, 2002
Date of Creation:
2001
Title:
Network security : private communication in a public world / Charlie Kaufman, Radia Perlman, Mike Speciner.
Edition:
[2nd ed.]
Basis of Claim:
New Matter: rev. & updated.
Previous Registration:
Prev. reg. 1995, TX 4-030-186.
Imprint:
Upper Saddle River, NJ : Prentice Hall, c2002.
Description:
713 p.
Copyright Claimant:
Pearson Education, Inc., formerly known as Prentice Hall, PTR
Names:
Charlie Kaufman (34 documents)
example document: Dangerous to know
Radia Perlman
Mike Speciner
Pearson Education, Inc. (5673 documents)
example document: Elementary algebra for college students, early graphing, second edition, [by] Allen R. Angel
Prentice Hall, PTR (22 documents)
example document: Apache Web server administration & E-commerce handbook
example document: Dangerous to know
Radia Perlman
Mike Speciner
Pearson Education, Inc. (5673 documents)
example document: Elementary algebra for college students, early graphing, second edition, [by] Allen R. Angel
|
Prentice Hall, PTR (22 documents)
example document: Apache Web server administration & E-commerce handbook
|
Network security and firewalls
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0005596699 / 2002-05-01
Date of Publication:
August 1, 2001
Date of Creation:
2001
Title:
Network security and firewalls : version 5.07 : official Certified Internet Webmaster curriculum.
Basis of Claim:
New Matter: rev. & added text.
Series:
CIW security professional series
Description:
1 v.
Variant title:
Network security and firewalls : version 5.07
Other Title:
CIW security professional series
Copyright Claimant:
ProsoftTraining
Authorship on Application:
ProsoftTraining, employer for hire of Timothy Crothers & James Stanger.
Names:
Timothy Crothers (2 documents)
example document: Operating system security
James Stanger
ProsoftTraining
example document: Operating system security
James Stanger
ProsoftTraining
Network security For Dummies
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0005638456 / 2002-11-04
Date of Publication:
October 22, 2002
Date of Creation:
2002
Title:
Network security For Dummies / by Chey Cobb.
Imprint:
New York : Wiley Pub., c2003.
Description:
380 p.
Copyright Claimant:
Wiley Publishing, Inc.
Names:
Chey Cobb
Wiley Publishing, Inc. (540 documents)
example document: iMac for Dummies
Wiley Publishing, Inc. (540 documents)
example document: iMac for Dummies
|
Network security JumpStart
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0005660484 / 2002-08-20
Date of Publication:
August 8, 2002
Date of Creation:
2002
Title:
Network security JumpStart / Matthew Strebe.
Imprint:
San Francisco : Sybex, c2002.
Description:
365 p.
Copyright Claimant:
Sybex, Inc.
Names:
Matthew Strebe
Sybex, Inc. (536 documents)
example document: Word for Windows
|
Sybex, Inc. (536 documents)
example document: Word for Windows
|
Network security principles and practices
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0005723958 / 2003-01-07
Date of Publication:
November 20, 2002
Date of Creation:
2002
Title:
Network security principles and practices / Saadat Malik.
Imprint:
Indianapolis : Cisco Press, c2003.
Description:
774 p.
Copyright Claimant:
Cisco Systems, Inc.
Names:
Saadat Malik
Cisco Systems, Inc. (122 documents)
example document: Introduction to Cisco networking technologies exam
Cisco Systems, Inc. (122 documents)
example document: Introduction to Cisco networking technologies exam
|
This website is not affiliated with document authors or copyright owners. This page is provided for informational purposes only. Unintentional errors are possible. Multiple persons can share the same name.