000 | 01254cam a2200361 a 4500 | ||
---|---|---|---|
001 | 2005027164 | ||
003 | DLC | ||
005 | 20190729110140.0 | ||
008 | 050916s2006 njua 001 0 eng | ||
010 | _a 2005027164 | ||
020 | _a0131481045 (pbk. : alk. paper) | ||
020 | _a9780131481046 | ||
035 | _a(OCoLC)ocm61694770 | ||
040 |
_aDLC _cDLC _dYDX _dBAKER _dWAU _dVP@ _dOCO _dDLC _dMvI |
||
050 | 0 | 0 |
_aTK5105.59 _b.S57 2006 |
082 | 0 | 0 |
_a005.8 _222 |
100 | 1 | _aSkoudis, Ed. | |
245 | 1 | 0 |
_aCounter hack reloaded : _ba step-by-step guide to computer attacks and effective defenses / _cEd Skoudis with Tom Liston. |
250 | _a2nd ed. | ||
260 |
_aUpper Saddle River, NJ : _bPrentice Hall Professional Technical Reference, _cc2006. |
||
300 |
_axxxii, 748 p. : _bill. ; _c24 cm. |
||
490 | 0 | _aRadia Perlman series in computer networking and security | |
500 | _aRev. ed. of: Counter hack, c2002. | ||
504 | _aIncludes bibliographical references and index. | ||
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 | _aData protection. | |
700 | 1 |
_aSkoudis, Ed. _tCounter hack. |
|
700 | 1 | _aListon, Tom. | |
948 | _au593756 | ||
949 |
_aTK5105.59 .S57 2006 _wLC _c1 _hEY8Z _i33039001355717 |
||
596 | _a1 | ||
903 | _a31522 | ||
999 |
_c31522 _d31522 |