Chained exploits : advanced hacking attacks from start to finish (Record no. 14331)

000 -LEADER
fixed length control field 00597nam a2200193Ia 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 161214s9999 xx 000 0 und d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780321498816
Terms of availability (pbk)
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number WHI
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Whitaker, Andrew
245 #0 - TITLE STATEMENT
Title Chained exploits : advanced hacking attacks from start to finish
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Upper Saddle River:
Name of publisher, distributor, etc Addison-Wesley,
Date of publication, distribution, etc 2009
300 ## - PHYSICAL DESCRIPTION
Extent xix, 279 p.;
Other physical details ill.:
Dimensions 24 cm.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer hackers
Topical term or geographic name as entry element Computer networks -- Security measures
Topical term or geographic name as entry element Computer security
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Evans, Keatron
Personal name Voth, Jack B.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Books
952 ## - LOCATION AND ITEM INFORMATION (KOHA)
-- 645Addison-Wesley
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Date acquired Source of acquisition Cost, normal purchase price Full call number Barcode Date last seen Date last borrowed Koha item type
          DAIICT DAIICT 2009-05-05 Baroda Book Corporation 0.00 005.8 WHI 022059 0000-00-00 0000-00-00 Books

Powered by Koha