| 000 | 01028cam a2200265 i 4500 | ||
|---|---|---|---|
| 005 | 20171212141723.0 | ||
| 008 | 070604s2006 xxua f |001 0 eng c | ||
| 020 | _a0131481045 | ||
| 035 | _azz2007872245 | ||
| 039 | 9 |
_a201711211325 _bkopilwa _c201707120124 _dVLOAD _c201707110149 _dVLOAD _c201005211201 _dus _y200706041323 _zpwr |
|
| 040 |
_aWR 16/sb _cWR 16/sb _dWR 16/ks |
||
| 100 | 1 | _aSkoudis, Ed. | |
| 245 | 1 | 0 |
_aCounter hack reloaded : _ba step-by-step guide to computer attacks and effective defenses / _cEd Skoudis with Tom Liston. |
| 250 | _a2nd ed. | ||
| 260 |
_aUpper Saddle River [etc.] : _bPrentice Hall, _c2006. |
||
| 300 |
_aXXXII, 748 s. : _bil. ; _c24 cm. |
||
| 490 | 1 | _aThe Radia Perlman Series in Computer Networking and Security | |
| 700 | 1 | _aListon, Tom. | |
| 830 | 4 | _aThe Radia Perlman Series in Computer Networking and Security | |
| 920 | _a0-13-148104-5 | ||
| 961 | _aWA_310 | ||
| 973 | _aKAT_U | ||
| 974 | _aWR_16 | ||
| 999 |
_aVIRTUA 0 _c17464 _d17464 |
||
| 999 | _aVTLSSORT0080*0200*0350*0400*1000*2450*2500*2600*3000*4400*7000*9200*9740*9992 | ||