It looks like you're offline.
Open Library logo
additional options menu

MARC Record from harvard_bibliographic_metadata

Record ID harvard_bibliographic_metadata/ab.bib.12.20150123.full.mrc:362363823:1648
Source harvard_bibliographic_metadata
Download Link /show-records/harvard_bibliographic_metadata/ab.bib.12.20150123.full.mrc:362363823:1648?format=raw

LEADER: 01648nam a2200313Ia 4500
001 012517849-2
005 20100628161046.0
008 100514s2010 njua b 001 0 eng d
020 $a0470550937
020 $a9780470550939
020 $a9780470550939
035 0 $aocm614432840
040 $aUMI$cUMI$dUMI$dMH
090 $aQA76.9.A25$bB42 2010
100 1 $aBeaver, Kevin.
245 10 $aHacking for dummies /$cby Kevin Beaver ; foreword by Stuart McClure.
250 $a3rd ed.
260 $aHoboken, N.J. :$bWiley Pub.,$cc2010.
300 $a1 online resource (xviii, 386 p.) :$bill.
490 1 $aFor dummies
500 $aDescription based on print version record.
504 $aIncludes bibliographical references and index.
520 $a"This beginner guide to hacking examines some of the best security measures that exist and has been updated to cover the latest hacks for Windows 7 and the newest version of Linux. Offering increased coverage of Web application hacks, database hacks, VoIP hacks, and mobile computing hacks, this guide addresses a wide range of vulnerabilities and how to identify and prevent them. Plus, you'll examine why ethical hacking is oftentimes the only way to find security flaws, which can then prevent any future malicious attacks. Hacking For Dummies, 3rd Edition shows you how to put all the necessary security measures in place so that you avoid becoming a victim of malicious hacking"--Resource description page.
650 0 $aComputer security.
650 0 $aComputer networks$xSecurity measures.
650 0 $aComputer hackers.
830 0 $a--For dummies.
988 $a20100628
906 $0OCLC