| 000 | 01035nam a2200301 a 4500 | ||
|---|---|---|---|
| 005 | 20250917235726.0 | ||
| 008 | 080701s2008 maua b 001 0 eng | ||
| 020 |
_a9781418048266 (hbk.) _cRM201.67 |
||
| 020 | _a1418048267 (hbk.) | ||
| 039 | 9 |
_a200811200945 _bbedah _c200811071000 _drasyilla _c200807011646 _didah _y07-01-2008 _zidah |
|
| 040 | _aUKM | ||
| 090 | _aTK5105.59.B378 | ||
| 090 |
_aTK5105.59 _b.B378 |
||
| 100 | 1 | _aBasta, Alfred | |
| 245 | 1 | 0 |
_aComputer security and penetration testing / _cAlfred Basta and Wolf Halton |
| 260 |
_aBoston : _bThomson/Course Technology, _c2008 |
||
| 300 |
_axvii, 414 p. : _bill. ; _c24 cm. |
||
| 504 | _aIncludes bibliographical references and index | ||
| 650 | 0 |
_aComputer networks _xSecurity measures |
|
| 700 | 1 | _aHalton, Wolf | |
| 907 |
_a.b14230069 _b2021-05-28 _c2019-11-12 |
||
| 942 |
_c01 _n0 _kTK5105.59.B378 |
||
| 914 | _avtls003381076 | ||
| 990 | _aza | ||
| 991 | _aJabatan Komputer Industri | ||
| 998 |
_at _b2008-01-07 _cm _da _feng _gmau _y0 _z.b14230069 |
||
| 999 |
_c418322 _d418322 |
||