| 000 | 02063cam a22004577i 4500 | ||
|---|---|---|---|
| 001 | 18845685 | ||
| 003 | NUST | ||
| 005 | 20221010122807.0 | ||
| 008 | 151104s2016 njua 001 0 eng d | ||
| 010 | _a 2015956627 | ||
| 020 | _a1119154685 | ||
| 020 | _a9781119154686 | ||
| 035 | _a(OCoLC)ocn908805314 | ||
| 040 |
_aYDXCP _beng _cYDXCP _erda _dBTCTA _dOCLCQ _dSFR _dCGP _dJQM _dJTH _dDLC |
||
| 042 | _alccopycat | ||
| 050 | 0 | 0 |
_aQA76.9.A25 _bB42 2016 |
| 082 | 0 | 4 |
_a005.8, BEA _223 |
| 100 | 1 |
_aBeaver, Kevin, _eauthor. _999661 |
|
| 245 | 1 | 0 |
_aHacking for dummies / _cby Kevin Beaver ; foreword by Richard Stiennon. |
| 250 | _a5th edition. | ||
| 264 | 1 |
_aHoboken, NJ : _bJohn Wiley & Sons, Inc., _c[2016] |
|
| 264 | 4 | _c©2016 | |
| 300 |
_axvi, 390 pages : _billustrations ; _c24 cm. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_aunmediated _bn _2rdamedia |
||
| 338 |
_avolume _bnc _2rdacarrier |
||
| 490 | 1 | _a--For dummies | |
| 505 | 0 | _aPart- I: Building the foundation for security testing (Page-7), Part- II: Putting security testing in motion (Page-59), Part-III: Hacking network hosts (Page-121),Part-IV: Hacking operating systems (Page-201),Part- V: Hacking applications (Page-253),Part-VI: Security testing aftermath (Page-317),Part-VII: The part of tens( Page-339). | |
| 650 | 0 |
_aComputer security. _9570 |
|
| 650 | 0 |
_aComputer networks _xSecurity measures. _9466 |
|
| 650 | 0 |
_aHackers. _927628 |
|
| 700 | 1 |
_aStiennon, Richard, _d1959- _eauthor of introduction, etc. _999662 |
|
| 830 | 0 |
_a--For dummies. _98103 |
|
| 856 | 4 | 2 |
_3Contributor biographical information _uhttps://www.loc.gov/catdir/enhancements/fy1701/2015956627-b.html |
| 856 | 4 | 2 |
_3Publisher description _uhttps://www.loc.gov/catdir/enhancements/fy1701/2015956627-d.html |
| 856 | 4 | 1 |
_3Table of contents only _uhttps://www.loc.gov/catdir/enhancements/fy1701/2015956627-t.html |
| 906 |
_a7 _bcbc _ccopycat _d2 _encip _f20 _gy-gencatlg |
||
| 942 |
_2ddc _cBK |
||
| 999 |
_c591608 _d591608 |
||