000 01474cam a2200385 i 4500
001 17464957
003 NUST
005 20220720134656.0
008 120917t20122012nyua 000 0 eng
010 _a 2012028820
020 _a9780071780285 (alk. paper)
020 _a0071780289 (alk. paper)
040 _aDLC
_beng
_cDLC
_erda
_dDLC
042 _apcc
050 0 0 _aTK5105.59
_b.M48 2012
082 0 0 _a005.8, MCC
_223
100 1 _aMcClure, Stuart.
_994084
240 1 0 _aHacking exposed
245 1 0 _aHacking exposed 7 :
_bnetwork security secrets & solutions /
_cStuart McClure, Joel Scambray, George Kurtz.
264 1 _aNew York :
_bMcGraw-Hill,
_c[2012]
264 4 _c©2012
300 _axxiv, 741 pages :
_billustrations ;
_c24 cm
336 _atext
_2rdacontent
337 _aunmediated
_2rdamedia
338 _avolume
_2rdacarrier
505 _aPart I Casing the Establishment (Page-1), Part II Endpoint and Server Hacking (Page-83), Part III Infrastructure Hacking (Page-313), Part IV Application and Data Hacking (Page-497), Part V Appendixes (Page-669).
650 0 _aComputer networks
_xSecurity measures.
_9466
650 0 _aComputer security.
_9570
700 1 _aMcclure, Stuart.
_994085
700 1 _aScambray, Joel.
_994086
700 1 _aKurtz, George.
_994087
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2ddc
_cBK
999 _c590402
_d590402