• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Chained exploits : advanced hacking attacks from start to finish

پدید آورنده
Andrew Whitaker, Keatron Evans, Jack B. Voth

موضوع
، Computer security,، Computer networks -- Security measures,، Computer hackers

رده
QA
76
.
9
.
A25W45

کتابخانه
Library of Institute for Research in Fundamental Sciences

محل استقرار
استان: Tehran ـ شهر: Tehran

Library of Institute for Research in Fundamental Sciences

تماس با کتابخانه : 22291812-021

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Chained exploits : advanced hacking attacks from start to finish
First Statement of Responsibility
Andrew Whitaker, Keatron Evans, Jack B. Voth

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Upper Saddle River, N.J.
Name of Publisher, Distributor, etc.
Addison-Wesley
Date of Publication, Distribution, etc.
c2009

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
xix, 279 p.: ill.

GENERAL NOTES

Text of Note
ISBN: 032149881X

ORIGINAL VERSION NOTE

Text of Note
1

TOPICAL NAME USED AS SUBJECT

Entry Element
، Computer security
Entry Element
، Computer networks -- Security measures
Entry Element
، Computer hackers

LIBRARY OF CONGRESS CLASSIFICATION

Class number
QA
76
.
9
.
A25W45

PERSONAL NAME - PRIMARY RESPONSIBILITY

Entry Element
Whitaker, Andrew
Relator Code
AU

AU Evans, Keatron
AU Voth, Jack B.
TI

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival