| 000 | 01056nam a2200349Ia 4500 | ||
|---|---|---|---|
| 003 | OSt | ||
| 005 | 20220912144409.0 | ||
| 006 | a|||||r|||| 00| 0 | ||
| 007 | ta | ||
| 008 | 220909b |||||||| |||| 00| 0 eng d | ||
| 020 | _a9781284031713 (pbk) | ||
| 020 | _aSL01562761 | ||
| 024 | _a192685 | ||
| 037 | _b279, 06/02/2015, Vardhman Books | ||
| 037 | _cTextbook | ||
| 040 |
_aCSL _beng _cCSL |
||
| 041 | _aeng | ||
| 082 | _aD65,8(B):(894), Q4 TD | ||
| 100 | _aOriyano Sean-Philip | ||
| 245 | 0 | _aHacker techniques tools and incident handling | |
| 250 | _a2 | ||
| 260 |
_aBurlington _bJones & Bartlett _c2014 |
||
| 300 | _axiii, 471p. ill. | ||
| 500 | _aAppendix A-B 387-390p.; Glossary 391-398p.; References 399-402p.; Index 403-417p. | ||
| 650 | _a Cryptographic | ||
| 650 | _a Malware | ||
| 650 | _a Port scanning | ||
| 650 | _aIncident response | ||
| 700 | _aOriyano Sean-Philip | ||
| 942 |
_hD65,8(B):(894), Q4 TD _cTB _2CC |
||
| 999 |
_c7089 _d7089 |
||