| 000 | 01431cam a22003377a 4500 | ||
|---|---|---|---|
| 001 | 15045036 | ||
| 003 | NUST | ||
| 005 | 20220720133941.0 | ||
| 008 | 071015s2008 caua b 001 0 eng | ||
| 010 | _a 2007042910 | ||
| 020 | _a9781593271442 (hbk.) | ||
| 020 | _a1593271441 (hbk.) | ||
| 035 | _a(OCoLC)ocn175218338 | ||
| 035 |
_a(OCoLC)175218338 _z(OCoLC)148663724 |
||
| 040 |
_aDLC _cDLC _dBTCTA _dBAKER _dYDXCP _dC#P _dDLC |
||
| 050 | 0 | 0 |
_aQA76.9.A25 _bE75 2008 |
| 082 | 0 | 0 |
_a005.8, ERI _222 |
| 100 | 1 |
_aErickson, Jon, _d1977- _994067 |
|
| 245 | 1 | 0 |
_aHacking : _bthe art of exploitation / _cJon Erickson. |
| 250 | _a2nd ed. | ||
| 260 |
_aSan Francisco, CA : _bNo Starch Press, _cc2008. |
||
| 300 |
_ax, 472 p. : _bill. ; _c23 cm. + _e1 CD-ROM (4 3/4 in.) |
||
| 505 | _a0x100. Introduction (Page-1), 0x200. Programming (Page-5), 0x300. Exploitation (Page-115), 0x400. Networking (Page-195), 0x500. Shellcode (Page-281), 0x600. Countermeasures (Page-319), 0x700. Cryptology (Page-393), 0x800. Conclusion (Page-451) | ||
| 650 | 0 |
_aComputer security. _9570 |
|
| 650 | 0 |
_aHackers. _927628 |
|
| 650 | 0 |
_aComputer networks _xSecurity measures. _9466 |
|
| 856 | 4 | 1 |
_3Table of contents _uhttp://www.loc.gov/catdir/toc/fy0804/2007042910.html |
| 906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
| 942 |
_2ddc _cBK |
||
| 999 |
_c590399 _d590399 |
||