| 000 | 01615cam a22003257a 4500 | ||
|---|---|---|---|
| 001 | 13083946 | ||
| 003 | NUST | ||
| 005 | 20221019122456.0 | ||
| 008 | 030205s2003 xxua 001 0 eng d | ||
| 010 | _a 2003101869 | ||
| 015 | _aGBA3-X7247 | ||
| 016 | 7 |
_a0764537105 _2Uk |
|
| 020 |
_a0764537105 (pbk.) : _c£24.50 |
||
| 040 |
_aStDuBDS _cStDuBDS _dUk _dCStRLIN _dDLC |
||
| 042 | _alccopycat | ||
| 050 | 0 | 0 |
_aQA76.9.A25 _bM436 2003 |
| 082 | 0 | 0 |
_a005.8,MCN _222 |
| 100 | 1 |
_aMcNamara, Joel. _9100792 |
|
| 245 | 1 | 0 |
_aSecrets of computer espionage : _btactics and countermeasures / _cJoel McNamara. |
| 260 |
_aNew York : _bWiley, _c2003. |
||
| 300 |
_axxi, 362 p. : _bill. ; _c24 cm. |
||
| 505 | _aApies (Page-1), Spying and the Law (Page-25), Black Bag Jobs (Page-47), Breaching the System (Page-67), Searching for Evidence (Page-95), Unprotected Data (Page-135), Copying Data (Page-163), Snooping with Kay loggers (Page-177), Spying with Trojan Horses (Page-205), Network Eavesdropping (Page-227), 802.11 b Wireless Network Eavesdropping (Page-259), Spying on Electronic Devices (Pages-289), Advanced Computer Espionage (Page-313). | ||
| 650 | 0 |
_aComputer security. _9570 |
|
| 650 | 0 |
_aComputer networks _xSecurity measures. _9466 |
|
| 650 | 0 |
_aElectronic surveillance. _9100793 |
|
| 856 | 4 | 2 |
_3Contributor biographical information _uhttp://www.loc.gov/catdir/bios/wiley046/2003101869.html |
| 856 | 4 | 1 |
_3Table of contents _uhttp://www.loc.gov/catdir/toc/wiley041/2003101869.html |
| 856 | 4 | 2 |
_3Publisher description _uhttp://www.loc.gov/catdir/description/wiley0310/2003101869.html |
| 942 |
_2ddc _cBK _k005.8,MCN |
||
| 999 |
_c591938 _d591938 |
||