| 000 | 01251cam a2200325 i 4500 | ||
|---|---|---|---|
| 999 |
_c14447 _d14447 |
||
| 001 | 20501332 | ||
| 005 | 20190923102206.0 | ||
| 008 | 180518s2020 mau b 001 0 eng | ||
| 010 | _a 2018023782 | ||
| 020 | _a978-1-284-14780-3 | ||
| 040 |
_aDLC _beng _cDLC _erda _dDLC |
||
| 042 | _apcc | ||
| 050 | 0 | 0 |
_aTK5105.59 _b.O786 2020 |
| 082 | 0 | 0 |
_aDC 005.8 _22020 _bOr49 |
| 100 | 1 |
_aOriyano, Sean-Philip, _eauthor. _939872 |
|
| 245 | 1 | 0 |
_aHacker techniques, tools, and incident handling / _cSean-Philip Oriyano, Michael G. Solomon. |
| 250 | _aThird edition. | ||
| 260 |
_aBurlington, MA : _bJones & Bartlett Learning, _c©2020. |
||
| 300 |
_axvi, 407 pages ; _c24 cm |
||
| 504 | _aIncludes bibliographical references (pages 387-389) and index. | ||
| 650 | 0 |
_aComputer security. _939873 |
|
| 650 | 0 |
_aPenetration testing (Computer security) _939874 |
|
| 650 | 0 |
_aComputer networks _xSecurity measures. _939875 |
|
| 650 | 0 |
_aHackers. _919513 |
|
| 700 | 1 |
_aSolomon, Michael _q(Michael G.), _d1963- _eauthor. _939876 |
|
| 365 |
_b8,860.00 _cPhp |
||
| 906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
| 942 |
_2ddc _cDC |
||