000 01603nam a22003855i 4500
005 20250919004359.0
008 150508t2015 inua 001 0 eng d
020 _a9781118987124 (paperback)
_cRM180.46
039 9 _a201512221153
_bhendon
_c201512221135
_dhendon
_c201512221134
_dhendon
_c201511261106
_drahah
_y05-08-2015
_zrahah
040 _aDLC
_beng
_erda
_cDLC
_dUKM
_erda
090 _aQA76.9.A25M6584 3
090 _aQA76.9.A25
_bM6584 3
100 1 _aMonte, Matthew,
_eauthor.
245 1 0 _aNetwork attacks & exploitation :
_ba framework /
_cMatthew Monte.
246 3 _aNetwork attacks and exploitation :
_ba framework.
264 1 _aIndianapolis, IN :
_bJohn Wiley & Sons,
_c2015.
264 4 _c©2015
300 _axviii, 198 pages :
_billustrations ;
_c24 cm.
336 _atext
_2rdacontent
337 _aunmediated
_2rdamedia
338 _avolume
_2rdacarrier
504 _aIncludes bibliographical references and index.
650 0 _aBusiness enterprises
_xComputer networks
_xSecurity measures.
650 0 _aComputer security.
650 0 _aComputer crimes
_xPrevention.
650 0 _aCorporations
_xSecurity measures.
907 _a.b16139458
_b2019-11-12
_c2019-11-12
942 _c01
_n0
_kQA76.9.A25M6584 3
914 _avtls003585854
990 _aha
991 _aFakulti Teknologi Sains Maklumat
998 _al
_b2015-08-05
_cm
_da
_feng
_ginu
_y0
_z.b16139458
999 _c591996
_d591996