|
|
|
|
| LEADER |
00000pam a2200000 a 4500 |
| 001 |
37184 |
| 003 |
MY-KLNDU |
| 005 |
20241218091220.0 |
| 008 |
s2008 xxu d 001 0 eng |
| 010 |
|
|
|a 2008-270481
|
| 020 |
|
|
|a 9781418048266 (pbk.)
|
| 020 |
|
|
|a 1418048267 (pbk.)
|
| 035 |
|
|
|a 0000029865
|
| 039 |
|
9 |
|a 201006161205
|b rafizah
|c 200911181054
|d VLOAD
|y 200910091625
|z VLOAD
|
| 040 |
|
|
|a DLC
|
| 090 |
0 |
0 |
|a TK5105.59
|b .B366 2008
|
| 100 |
1 |
|
|a Basta, Alfred
|
| 245 |
1 |
0 |
|a Computer security and penetration testing
|c Alfred Basta and Wolf Halton
|
| 260 |
|
|
|a Boston
|b Thomson
|c c2008
|
| 300 |
|
|
|a xvii, 414 p.
|b ill.
|c 24 cm.
|
| 504 |
|
|
|a Includes bibliographical references and index
|
| 505 |
0 |
|
|a Ethics of hacking and cracking -- Reconnaissance -- Scanning tools -- Sniffers -- TCP/IP vulnerabilities -- Encryption and password cracking -- Spoofing -- Session hijacking -- Hacking network devices -- Trojan horses -- Denial-of-service attacks -- Buffer overflows -- Programming exploits -- Mail vulnerabilities -- Web application vulnerabilities -- Windows vulnerabilities -- Linux vulnerabilities -- Incident handling
|
| 591 |
|
|
|a 0000000224
|b 07/05/08
|c 0201-07
|d 1
|e USD52.95
|f 3.68
|g 195.01
|h KOPERASI KEDAIBUKU UNIVERSITI MALAYA BER
|
| 592 |
|
|
|a B0806210228
|c RM174.21
|
| 650 |
|
0 |
|a Computer networks
|x Security measures
|
| 700 |
1 |
|
|a Halton, Wolf
|
| 999 |
|
|
|a vtls000027169
|c 37184
|d 37184
|