| 000 | 03444cam a22004817i 4500 | ||
|---|---|---|---|
| 001 | 19506069 | ||
| 003 | NUST | ||
| 005 | 20221010133553.0 | ||
| 008 | 170216t20172017inu b 001 0 eng d | ||
| 010 | _a 2017934291 | ||
| 020 |
_a9781119396215 _q(paperback) |
||
| 020 |
_a1119396212 _q(paperback) |
||
| 035 | _a(OCoLC)ocn986788432 | ||
| 040 |
_aPNX _beng _cPNX _erda _dOCLCO _dJQM _dOCLCQ _dBDX _dOCLCF _dBKL _dCHVBK _dOCLCO _dOCLCA _dIGA _dJQW _dOCL _dDLC |
||
| 042 | _alccopycat | ||
| 050 | 0 | 0 |
_aQA76.9.A25 _bG758 2017 |
| 082 | 0 | 4 |
_a005.8, GRI _223 |
| 100 | 1 |
_aGrimes, Roger A., _eauthor. _999687 |
|
| 245 | 1 | 0 |
_aHacking the hacker : _blearn from the experts who take down hackers / _cRoger A. Grimes. |
| 264 | 1 |
_aIndianapolis, IN : _bJohn Wiley & Sons, Inc., _c[2017] |
|
| 264 | 4 | _c©2017 | |
| 300 |
_axxx, 286 pages ; _c23 cm |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_aunmediated _bn _2rdamedia |
||
| 338 |
_avolume _bnc _2rdacarrier |
||
| 505 | 0 | _aWhat type of hacker are you? (Page-1), How hackers hack (Page-9),Profile: Bruce Schneier (Page-23),Social engineering (Page-27),Profile: Kevin Mitnick (Page-33), Software vulnerabilities (Page-39),Profile: Michael Howard (Page-45),Profile: Gary McGraw (Page-51),Malware (Page-55),Profile: Susan Bradley (Page-61),Profile: Mark Russinovich (Page-65),Cryptography (Page-69),Profile: Martin Hellman (Page-75), Intrusion detection/APTs (Page-81),Profile: Dr. Dorothy E. Denning (Page-87),Profile: Michael Dubinsky (Page-91),Firewalls (Page-95),Profile: William Cheskwick (Page-101),Honeypots (Page-107),Profile: Lance Spitzner (Page-111),Password hacking (Page-115),Profile: Dr. Cormac Herley (Page-123),Wireless hacking (Page-127),Profile: Thomas d'Otreppe de Bouvette (Page-133),Penetration testing (Page-137),Profile: Aaron Higbee (Page-147),Profile: Benild Joseph (Page-151),DDoS attacks (Page-155),Profile: Brian Krebs (Page-161),Secure OS (Page-165),Profile: Joanna Rutkowska (Page-171),Profile: Aaron Margosis (Page-175),Network attacks (Page-181),Profile: Laura Chappell (Page-185),IoT hacking (Page-189),Profile: Dr. Charlie Mille (Page-193), Policy and strategy (Page-201),Profile: Jing de Jong-Chen (Page-205),Threat modeling (Page-211),Profile: Adam Shostack (Page-217),Computer security education (Page-221),Profile: Stephen Northcutt (Page-227),Privacy (Page-231),Profile: Eva Galperin (Page-235),Patching (Page-239),Profile: Window Snyder (Page-245),Writing as a career (Page-249),Profile: Fahmida Y. Rashid (Page-259),Guide for parents with young hackers (Page-263),Hacker code of ethics (Page-271). | |
| 650 | 0 |
_aComputer security. _9570 |
|
| 650 | 0 |
_aHackers. _927628 |
|
| 650 | 0 |
_aHacking. _999688 |
|
| 650 | 0 | _aCryptography. | |
| 650 | 0 |
_aComputer networks _xSecurity measures. _9466 |
|
| 650 | 7 |
_aCOMPUTERS / Security / Cryptography. _2bisacsh _96108 |
|
| 650 | 7 |
_aCryptography. _2fast _0(OCoLC)fst00884552 _999689 |
|
| 650 | 7 |
_aComputer networks _xSecurity measures. _2fast _0(OCoLC)fst00872341 _9466 |
|
| 650 | 7 |
_aComputer security. _2fast _0(OCoLC)fst00872484 _9570 |
|
| 650 | 7 |
_aHackers. _2fast _0(OCoLC)fst00872150 _927628 |
|
| 650 | 7 |
_aHacking. _2fast _0(OCoLC)fst01909643 _999688 |
|
| 650 | 7 |
_aComputersicherheit _2gnd _994105 |
|
| 710 | 2 |
_aInternational Information Systems Security Certification Consortium. _999690 |
|
| 906 |
_a7 _bcbc _ccopycat _d2 _eepcn _f20 _gy-gencatlg |
||
| 942 |
_2ddc _cBK |
||
| 999 |
_c591620 _d591620 |
||