The hackers handbook : the strategy behind breaking into and defending networks /
13
Main Authors: | , |
---|---|
Format: | |
Language: | eng |
Published: |
Boca Raton, FL : Auerbach Pub.,
2004
|
Subjects: |
_version_ | 1796713285547982848 |
---|---|
author | 258022 Young, Susan (Susan Elizabeth), 1968- Aitel, Dave |
author_facet | 258022 Young, Susan (Susan Elizabeth), 1968- Aitel, Dave |
author_sort | 258022 Young, Susan (Susan Elizabeth), 1968- |
collection | OCEAN |
description | 13 |
first_indexed | 2024-03-05T05:03:38Z |
format | |
id | KOHA-OAI-TEST:331293 |
institution | Universiti Teknologi Malaysia - OCEAN |
language | eng |
last_indexed | 2024-03-05T05:03:38Z |
publishDate | 2004 |
publisher | Boca Raton, FL : Auerbach Pub., |
record_format | dspace |
spelling | KOHA-OAI-TEST:3312932020-12-19T17:11:13ZThe hackers handbook : the strategy behind breaking into and defending networks / 258022 Young, Susan (Susan Elizabeth), 1968- Aitel, Dave Boca Raton, FL : Auerbach Pub.,2004eng13PSZJBLComputer networksComputer networksComputer hackersURN:ISBN:0849308887 (hbk.) |
spellingShingle | Computer networks Computer networks Computer hackers 258022 Young, Susan (Susan Elizabeth), 1968- Aitel, Dave The hackers handbook : the strategy behind breaking into and defending networks / |
title | The hackers handbook : the strategy behind breaking into and defending networks / |
title_full | The hackers handbook : the strategy behind breaking into and defending networks / |
title_fullStr | The hackers handbook : the strategy behind breaking into and defending networks / |
title_full_unstemmed | The hackers handbook : the strategy behind breaking into and defending networks / |
title_short | The hackers handbook : the strategy behind breaking into and defending networks / |
title_sort | hackers handbook the strategy behind breaking into and defending networks |
topic | Computer networks Computer networks Computer hackers |
work_keys_str_mv | AT 258022youngsusansusanelizabeth1968 thehackershandbookthestrategybehindbreakingintoanddefendingnetworks AT aiteldave thehackershandbookthestrategybehindbreakingintoanddefendingnetworks AT 258022youngsusansusanelizabeth1968 hackershandbookthestrategybehindbreakingintoanddefendingnetworks AT aiteldave hackershandbookthestrategybehindbreakingintoanddefendingnetworks |