000 01251cam a2200325 i 4500
999 _c14447
_d14447
001 20501332
005 20190923102206.0
008 180518s2020 mau b 001 0 eng
010 _a 2018023782
020 _a978-1-284-14780-3
040 _aDLC
_beng
_cDLC
_erda
_dDLC
042 _apcc
050 0 0 _aTK5105.59
_b.O786 2020
082 0 0 _aDC 005.8
_22020
_bOr49
100 1 _aOriyano, Sean-Philip,
_eauthor.
_939872
245 1 0 _aHacker techniques, tools, and incident handling /
_cSean-Philip Oriyano, Michael G. Solomon.
250 _aThird edition.
260 _aBurlington, MA :
_bJones & Bartlett Learning,
_c©2020.
300 _axvi, 407 pages ;
_c24 cm
504 _aIncludes bibliographical references (pages 387-389) and index.
650 0 _aComputer security.
_939873
650 0 _aPenetration testing (Computer security)
_939874
650 0 _aComputer networks
_xSecurity measures.
_939875
650 0 _aHackers.
_919513
700 1 _aSolomon, Michael
_q(Michael G.),
_d1963-
_eauthor.
_939876
365 _b8,860.00
_cPhp
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2ddc
_cDC