| 000 | 01040 a2200181 4500 | ||
|---|---|---|---|
| 003 | Nust | ||
| 005 | 20220725182013.0 | ||
| 010 | _a 2013939807 | ||
| 020 | _a9780840020932 | ||
| 040 | _cNust | ||
| 082 | _a005.8,BAS | ||
| 100 | 1 |
_aBasta, Alfred. _928828 |
|
| 245 | 1 | 0 |
_aComputer security and penetration testing / _cAlfred Basta, Nadine Basta, Mary Brown. |
| 250 | _a2nd Ed. | ||
| 300 | _axix;376 p, | ||
| 505 | _aEthics of Hacking and Cracking. (Page-1), Reconnaissance. (Page-17) , Scanning Tools. (Page-45), Sniffers. ( Page-67), TCP/IP Vulnerabilities (Page-95), Techniques of Password Cracking. ( Page-115), Spoofing. (Page-137), Session Hijacking. (Page-157), Hacking Network Devices (Page-175), Trojan Horses ( Page-195), Denial of Service Attacks. (Page-211), Buffer Overflows (Page-231), Programming Exploits (Page-249), Mail Vulnerabilities (Page-265), Web Application Vulnerabilities ( Page-289) Windows Vulnerabilities (Page-311), Linux Vulnerabilities (Page-321), Incident Handling (Page-335). | ||
| 942 |
_2ddc _cBK |
||
| 999 |
_c213874 _d213874 |
||