|
|
|
|
LEADER |
01188nam a2200349 i 4500 |
001 |
181-019165359 |
003 |
Uk |
005 |
20190808212152.0 |
008 |
180518s2020 mau b 001 0 eng |
007 |
tu |
010 |
|
|
|a 2018023782
|
020 |
|
|
|a 9781284147803
|q (pbk.)
|
040 |
|
|
|a DLC
|b eng
|c DLC
|d DLC
|d Uk
|e rda
|
042 |
|
|
|a ukblcatcopy
|
050 |
0 |
0 |
|a TK5105.59
|b .O786 2020
|
082 |
0 |
0 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Oriyano, Sean-Philip
|e author.
|
245 |
1 |
0 |
|a Hacker techniques, tools, and incident handling
|c Sean-Philip Oriyano, Michael G. Solomon
|
250 |
|
|
|a Third edition.
|
264 |
|
1 |
|a Burlington, MA
|b Jones & Bartlett Learning
|c [2020]
|
300 |
|
|
|a xvi, 407 pages ;
|c 24 cm.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a unmediated
|b n
|2 rdamedia
|
338 |
|
|
|a volume
|b nc
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references (pages 387-389) and index.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Hackers.
|
700 |
1 |
|
|a Solomon, Michael
|q (Michael G.),
|d 1963-
|e author.
|
852 |
1 |
1 |
|a British Library
|b STI
|k (B)
|h 005.8
|
980 |
|
|
|a 019165359
|b 181
|c sid-181-col-blfidbbi
|
SOLR
_version_ |
1778756034650701824 |
access_facet |
Local Holdings |
author |
Oriyano, Sean-Philip, Solomon, Michael |
author_facet |
Oriyano, Sean-Philip, Solomon, Michael |
author_fuller |
(Michael G.), |
author_role |
aut, aut |
author_sort |
Oriyano, Sean-Philip |
author_variant |
s p o spo, m s ms |
building |
Library A |
callnumber-first |
T - Technology |
callnumber-label |
TK5105 |
callnumber-raw |
TK5105.59 .O786 2020 |
callnumber-search |
TK5105.59 .O786 2020 |
callnumber-sort |
TK 45105.59 O786 42020 |
callnumber-subject |
TK - Electrical and Nuclear Engineering |
collection |
sid-181-col-blfidbbi |
dewey-full |
005.8 |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-ones |
005 - Computer programming, programs & data |
dewey-raw |
005.8 |
dewey-search |
005.8 |
dewey-sort |
15.8 |
dewey-tens |
000 - Computer science, knowledge & systems |
edition |
Third edition. |
facet_avail |
Local |
finc_class_facet |
Informatik, Technik |
fincclass_txtF_mv |
science-computerscience |
format |
Book |
format_access_txtF_mv |
Book, E-Book |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-print-monograph-independent |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
Book |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
Book |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
id |
181-019165359 |
illustrated |
Not Illustrated |
imprint |
Burlington, MA, Jones & Bartlett Learning, [2020] |
imprint_str_mv |
Burlington, MA Jones & Bartlett Learning [2020] |
institution |
FID-BBI-DE-23 |
is_hierarchy_id |
|
is_hierarchy_title |
|
isbn |
9781284147803 |
isil_str_mv |
FID-BBI-DE-23 |
language |
English |
last_indexed |
2023-10-03T17:25:43.605Z |
lccn |
2018023782 |
match_str |
oriyano2020hackertechniquestoolsandincidenthandling |
mega_collection |
British Library Catalogue |
physical |
xvi, 407 pages; 24 cm |
publishDate |
[2020] |
publishDateSort |
2020 |
publishPlace |
Burlington, MA |
publisher |
Jones & Bartlett Learning |
record_format |
marcfinc |
record_id |
019165359 |
recordtype |
marcfinc |
rvk_facet |
No subject assigned |
source_id |
181 |
spelling |
Oriyano, Sean-Philip author., Hacker techniques, tools, and incident handling Sean-Philip Oriyano, Michael G. Solomon, Third edition., Burlington, MA Jones & Bartlett Learning [2020], xvi, 407 pages ; 24 cm., text txt rdacontent, unmediated n rdamedia, volume nc rdacarrier, Includes bibliographical references (pages 387-389) and index., Computer security., Penetration testing (Computer security), Computer networks Security measures., Hackers., Solomon, Michael (Michael G.), 1963- author., British Library STI (B) 005.8 |
spellingShingle |
Oriyano, Sean-Philip, Solomon, Michael, Hacker techniques, tools, and incident handling, Computer security., Penetration testing (Computer security), Computer networks Security measures., Hackers. |
title |
Hacker techniques, tools, and incident handling |
title_auth |
Hacker techniques, tools, and incident handling |
title_full |
Hacker techniques, tools, and incident handling Sean-Philip Oriyano, Michael G. Solomon |
title_fullStr |
Hacker techniques, tools, and incident handling Sean-Philip Oriyano, Michael G. Solomon |
title_full_unstemmed |
Hacker techniques, tools, and incident handling Sean-Philip Oriyano, Michael G. Solomon |
title_short |
Hacker techniques, tools, and incident handling |
title_sort |
hacker techniques tools and incident handling |
topic |
Computer security., Penetration testing (Computer security), Computer networks Security measures., Hackers. |
topic_facet |
Computer security., Penetration testing (Computer security), Computer networks, Hackers., Security measures. |