005 |
|
20201030142814.0 |
010 |
|
|a2003017498
|
020 |
|
|a1593270070 (pbk.) :|cUSD39.95
|
035 |
|
|aoc0103
|
040 |
|
|aDLC|cDLC|dIG&|35;|dNOU
|
050 |
00
|
|aQA76.9.A25|bE75 2003
|
082 |
00
|
|a005.8|222
|
095 |
|
|aNOU|bLBA|cE014148|dQA76.9.A25|eE75|pBOOK|y2003|n1150|zB|m0|tLCC
|
100 |
1
|
|aErickson, Jon|q(Jon Mark),|d1977-.
|
245 |
10
|
|aHacking :|bthe art of exploitation /|cby Jon Erickson.
|
260 |
|
|aSan Francisco :|bNo Starch Press,|cc2003.
|
300 |
|
|axi, 241 p. :|bill. ;|c24 cm.
|
504 |
|
|aIncludes bibliographical references and index.
|
650 |
0
|
|aComputer security.
|
650 |
0
|
|aComputer hackers.
|
650 |
0
|
|aComputer networks|xSecurity measures.
|
809 |
|
|pBOOK|dQA76.9.A25|eE75|y2003
|
856 |
41
|
|3Table of contents|uhttp://www.loc.gov/catdir/toc/ecip047 /2003017498.html|zConnect to Table of contents
|