000 | 01365cam a2200373 i 4500 | ||
---|---|---|---|
001 | 20501332 | ||
003 | OSt | ||
005 | 20200901113252.0 | ||
008 | 180518s2020 mau b 001 0 eng | ||
010 | _a 2018023782 | ||
020 |
_a9781284147803 _q(pbk.) |
||
040 |
_aDLC _beng _cDLC _erda _dDLC |
||
042 | _apcc | ||
050 | 0 | 0 |
_aTK5105.59 _b.O786 2020 |
082 | 0 | 0 |
_a005.8 _223 |
100 | 1 |
_aOriyano, Sean-Philip, _eauthor. |
|
245 | 1 | 0 |
_aHacker techniques, tools, and incident handling / _cSean-Philip Oriyano, Michael G. Solomon. |
250 | _a3rd Ed. | ||
264 | 1 |
_aBurlington, MA : _bJones & Bartlett Learning, _c2020 |
|
300 |
_axvi, 407 pages ; _c24 cm |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
504 | _aIncludes bibliographical references (pages 387-389) and index. | ||
650 | 0 | _aComputer security. | |
650 | 0 | _aPenetration testing (Computer security) | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 | _aHackers. | |
700 | 1 |
_aSolomon, Michael _q(Michael G.), _d1963- _eauthor. |
|
906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
942 |
_2udc _cBK |
||
999 |
_c88106 _d88106 |