Record ID | ia:counterhackstepb00skou |
Source | Internet Archive |
Download MARC XML | https://archive.org/download/counterhackstepb00skou/counterhackstepb00skou_marc.xml |
Download MARC binary | https://www.archive.org/download/counterhackstepb00skou/counterhackstepb00skou_meta.mrc |
LEADER: 00859cam a2200265 a 4500
001 2001277004
003 DLC
005 20080915121052.0
008 011114s2002 njua 001 0 eng c
010 $a 2001277004
035 $a(OCoLC)ocm46944973
040 $aUKM$cUKM$dOCLCQ$dAZS$dDLC
042 $alccopycat
015 $aGBA1-X7704
020 $a0130332739
050 00 $aTK5105.59$b.S57 2002
082 00 $a005.8$221
100 1 $aSkoudis, Ed.
245 10 $aCounter hack :$ba step-by-step guide to computer attacks and effective defenses /$cEd Skoudis.
260 $aUpper Saddle River, N.J. :$bPrentice Hall PTR,$cc2002.
300 $axxii, 564 p. :$bill. ;$c23 cm.
440 0 $aPrentice Hall series in computer networking and distributed systems
500 $aIncludes index.
650 0 $aComputer networks$xSecurity measures.
650 0 $aData protection.