|
|
|
|
LEADER |
01883nmm a2200433 u 4500 |
001 |
EB001951251 |
003 |
EBX01000000000000001114153 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 0764544683
|
020 |
|
|
|a 9780764544682
|
050 |
|
4 |
|a QA76.9.A25
|
100 |
1 |
|
|a Koziol, Jack
|
245 |
0 |
0 |
|a The shellcoder's handbook
|b discovering and exploiting security holes
|c Jack Koziol [and others]
|
260 |
|
|
|a Indianapolis, Ind.
|b Wiley Pub.
|c 2004
|
300 |
|
|
|a xxiii, 620 pages
|b illustrations
|
653 |
|
|
|a risk assessment / aat
|
653 |
|
|
|a Computer security
|
653 |
|
|
|a Sécurité informatique
|
653 |
|
|
|a Data protection / fast
|
653 |
|
|
|a Évaluation du risque
|
653 |
|
|
|a Data protection / http://id.loc.gov/authorities/subjects/sh85035859
|
653 |
|
|
|a Risk assessment / http://id.loc.gov/authorities/subjects/sh87002638
|
653 |
|
|
|a Risk Assessment
|
653 |
|
|
|a Risk assessment / fast
|
653 |
|
|
|a Computer security / fast
|
653 |
|
|
|a Computer Security
|
653 |
|
|
|a Protection de l'information (Informatique)
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
500 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002
|
500 |
|
|
|a May be limited to subscribing institutions
|
776 |
|
|
|z 9780764544682
|
776 |
|
|
|z 9780764544682
|
776 |
|
|
|z 0764544683
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780764544682/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a "Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again."--Resource description page
|