Record ID | marc_loc_updates/v37.i15.records.utf8:9018668:886 |
Source | Library of Congress |
Download Link | /show-records/marc_loc_updates/v37.i15.records.utf8:9018668:886?format=raw |
LEADER: 00886cam a2200277 a 4500
001 2009002128
003 DLC
005 20090407101458.0
008 090121s2009 njua 001 0 eng
010 $a 2009002128
020 $a9780321498816 (pbk.)
020 $a032149881X (pbk.)
035 $a(OCoLC)300981495
040 $aDLC$cDLC$dC#P$dYDXCP$dBWX$dDLC
050 00 $aQA76.9.A25$bW44 2009
082 00 $a005.8$222
100 1 $aWhitaker, Andrew.
245 10 $aChained exploits :$badvanced hacking attacks from start to finish /$cAndrew Whitaker, Keatron Evans, Jack B. Voth.
260 $aUpper Saddle River, NJ :$bAddison-Wesley,$cc2009.
300 $axix, 279 p. :$bill. ;$c24 cm.
500 $aIncludes index.
650 0 $aComputer security.
650 0 $aComputer networks$xSecurity measures.
650 0 $aComputer hackers.
700 1 $aEvans, Keatron.
700 1 $aVoth, Jack B.