| 000 | 02677cam a2200529Ii 4500 | ||
|---|---|---|---|
| 005 | 20250919132331.0 | ||
| 006 | m o d | ||
| 007 | cr cnu|||unuuu | ||
| 008 | 190918s2017 inu o 001 0 eng d | ||
| 020 |
_a9781119396260 _q(electronic bk. : oBook) |
||
| 020 |
_a1119396263 _q(electronic bk. : oBook) |
||
| 020 |
_a9781119396222 _q(electronic bk.) |
||
| 020 |
_a1119396220 _q(electronic bk.) |
||
| 020 |
_z9781119396215 _q(print) |
||
| 020 | _z1119396212 | ||
| 035 |
_a(OCoLC)983465946 _z(OCoLC)985399857 |
||
| 035 | _a(OCoLC)ocn983465946 | ||
| 039 | 9 |
_a201911041635 _bros _y09-18-2019 _zhafiz _wUKM UBCM Wiley MARC (363 titles).mrc _x261 |
|
| 040 |
_aNST _beng _erda _epn _cNST _dDG1 _dNST _dYDX |
||
| 049 | _aMAIN | ||
| 050 | 4 | _aQA76.9.A25 | |
| 072 | 7 |
_aCOM _x053000 _2bisacsh |
|
| 082 | 0 | 4 |
_a005.8/7 _223 |
| 100 | 1 |
_aGrimes, Roger A., _eauthor. |
|
| 245 | 1 | 0 |
_aHacking the hacker : _blearn from the experts who take down hackers / _cRoger A. Grimes. |
| 264 | 1 |
_aIndianapolis, IN : _bWiley, _c2017. |
|
| 300 | _a1 online resource. | ||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 500 | _aIncludes index. | ||
| 505 | 0 | _aWhat Type of Hacker Are You? -- How Hackers Hack -- Profile -- Social Engineering -- Profile -- Software Vulnerabilities -- Profile -- Profile -- Malware -- Profile -- Profile -- Cryptography -- Profile -- Intrusion Detection/APTs -- Profile -- Profile -- Firewalls -- Profile -- Honeypots -- Profile -- Password Hacking -- Profile -- Wireless Hacking -- Profile -- Penetration Testing -- Profile -- Profile -- DDoS Attacks -- Profile -- Secure OS -- Profile -- Profile -- Network Attacks -- Profile -- IoT Hacking -- Profile -- Policy and Strategy -- Profile -- Threat Modeling -- Profile -- Computer Security Education -- Profile -- Privacy -- Profile -- Patching -- Profile -- Writing as a Career -- Profile -- Guide for Parents with Young Hackers -- Hacker Code of Ethics. | |
| 588 | 0 | _aOnline resource; title from PDF title page (John Wiley, viewed April 26, 2017). | |
| 650 | 0 | _aHacking. | |
| 650 | 0 | _aComputer security. | |
| 650 | 7 |
_aCOMPUTERS / Security / General _2bisacsh |
|
| 655 | 4 | _aElectronic books. | |
| 773 | 0 | _tWiley e-books | |
| 776 | 0 | 8 |
_cOriginal _z1119396212 _z9781119396215 _w(OCoLC)967719056 |
| 856 | 4 | 0 |
_uhttps://eresourcesptsl.ukm.remotexs.co/user/login?url=https://doi.org/10.1002/9781119396260 _zWiley Online Library |
| 907 |
_a.b16757580 _b2022-11-07 _c2019-11-12 |
||
| 942 | _n0 | ||
| 914 | _avtls003651415 | ||
| 998 |
_ae _b2019-05-09 _cm _dz _feng _ginu _y0 _z.b16757580 |
||
| 999 |
_c643645 _d643645 |
||