000 01431cam a22003377a 4500
001 15045036
003 NUST
005 20220720133941.0
008 071015s2008 caua b 001 0 eng
010 _a 2007042910
020 _a9781593271442 (hbk.)
020 _a1593271441 (hbk.)
035 _a(OCoLC)ocn175218338
035 _a(OCoLC)175218338
_z(OCoLC)148663724
040 _aDLC
_cDLC
_dBTCTA
_dBAKER
_dYDXCP
_dC#P
_dDLC
050 0 0 _aQA76.9.A25
_bE75 2008
082 0 0 _a005.8, ERI
_222
100 1 _aErickson, Jon,
_d1977-
_994067
245 1 0 _aHacking :
_bthe art of exploitation /
_cJon Erickson.
250 _a2nd ed.
260 _aSan Francisco, CA :
_bNo Starch Press,
_cc2008.
300 _ax, 472 p. :
_bill. ;
_c23 cm. +
_e1 CD-ROM (4 3/4 in.)
505 _a0x100. Introduction (Page-1), 0x200. Programming (Page-5), 0x300. Exploitation (Page-115), 0x400. Networking (Page-195), 0x500. Shellcode (Page-281), 0x600. Countermeasures (Page-319), 0x700. Cryptology (Page-393), 0x800. Conclusion (Page-451)
650 0 _aComputer security.
_9570
650 0 _aHackers.
_927628
650 0 _aComputer networks
_xSecurity measures.
_9466
856 4 1 _3Table of contents
_uhttp://www.loc.gov/catdir/toc/fy0804/2007042910.html
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2ddc
_cBK
999 _c590399
_d590399