The software vulnerability guide
Saved in:
| Main Author: | |
|---|---|
| Other Authors: | |
| Format: | Book |
| Published: |
Hingham
Charles River Media
2005
|
| Edition: | 1st ed. |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000pam a2200000 4500 | ||
|---|---|---|---|
| 001 | 36265 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241218090946.0 | ||
| 020 | 0 | 0 | |a 1584503580 |
| 035 | |a 0000029211 | ||
| 039 | 9 | |a 201003100908 |b hafizah |y 200910091613 |z VLOAD | |
| 090 | 0 | 0 | |a QA76.9.A25 |b T475 2005 |
| 100 | 1 | 0 | |a Thompson |h Herbert H. |
| 245 | 1 | 0 | |a The software vulnerability guide |c Herbert H.Thompson,Scott G.Chase |
| 250 | 0 | 0 | |a 1st ed. |
| 260 | 0 | 0 | |a Hingham |b Charles River Media |c 2005 |
| 300 | |a xiii,354p. |b ill |c 23cm | ||
| 500 | 0 | 0 | |a Includes bibliographical references and index |
| 500 | 0 | 0 | |a CD available for loan |
| 650 | 0 | 0 | |a Computer security |
| 650 | 0 | 0 | |a Computer software |x development |
| 650 | 0 | 0 | |a Computer networks |x Security measures |
| 700 | 1 | 1 | |a Chase |h Scott G. |
| 999 | |a vtls000025977 |c 36265 |d 36265 | ||


