000 | 01326cam a22003137a 4500 | ||
---|---|---|---|
999 |
_c7555 _d8730 |
||
001 | 15045036 | ||
005 | 20181212144612.0 | ||
008 | 071015s2008 caua b 001 0 eng | ||
010 | _a 2007042910 | ||
020 | _a9781593271442 (hbk.) | ||
020 | _a1593271441 (hbk.) | ||
035 | _a(OCoLC)ocn175218338 | ||
035 |
_a(OCoLC)175218338 _z(OCoLC)148663724 |
||
080 | _a681.3 E 75 | ||
082 | 0 | 0 | _222 |
100 | 1 |
_aErickson, Jon, _d1977- |
|
245 | 1 | 0 |
_aHacking : the art of exploitation / _cJon Erickson. |
250 | _a2nd ed. | ||
260 |
_aSan Francisco, CA : _bNo Starch Press, _cc2008. |
||
300 |
_ax, 472 p. : _bill. ; _c23 cm. + _e1 CD-ROM (4 3/4 in.) |
||
504 | _aIncludes bibliographical references and index. | ||
650 | 0 |
_aComputer security. _2LEMB |
|
650 | 0 |
_aHackers. _2LEMB |
|
650 | 0 |
_aComputer networks _xSecurity measures. _2LEMB |
|
651 | _2LEMB | ||
856 | 4 | 1 |
_3Table of contents _uhttp://www.loc.gov/catdir/toc/fy0804/2007042910.html |
906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |