Record ID | marc_loc_updates/v39.i39.records.utf8:3052945:989 |
Source | Library of Congress |
Download Link | /show-records/marc_loc_updates/v39.i39.records.utf8:3052945:989?format=raw |
LEADER: 00989cam a22002897a 4500
001 2007042910
003 DLC
005 20110920100320.0
008 071015s2008 caua b 001 0 eng
010 $a 2007042910
020 $a9781593271442 (hbk.)
020 $a1593271441 (hbk.)
035 $a(OCoLC)ocn175218338
035 $a(OCoLC)175218338$z(OCoLC)148663724
040 $aDLC$cDLC$dBTCTA$dBAKER$dYDXCP$dC#P$dDLC
050 00 $aQA76.9.A25$bE75 2008
082 00 $a005.8$222
100 1 $aErickson, Jon,$d1977-
245 10 $aHacking :$bthe art of exploitation /$cJon Erickson.
250 $a2nd ed.
260 $aSan Francisco, CA :$bNo Starch Press,$cc2008.
300 $ax, 472 p. :$bill. ;$c23 cm. +$e1 CD-ROM (4 3/4 in.)
504 $aIncludes bibliographical references and index.
650 0 $aComputer security.
650 0 $aComputer hackers.
650 0 $aComputer networks$xSecurity measures.
856 41 $3Table of contents$uhttp://www.loc.gov/catdir/toc/fy0804/2007042910.html