000 02298cam a2200589Ia 4500
001 on1184234625
003 OCoLC
005 20220711203610.0
006 m o d
007 cr |n|||||||||
008 200820s2020 inu o 001 0 eng d
040 _aYDX
_beng
_cYDX
_dDG1
_dYDX
_dUKMGB
_dN$T
_dRECBK
_dOCLCF
015 _aGBC037034
_2bnb
016 7 _a019738701
_2Uk
019 _a1197737980
_a1197768941
020 _a9781119561507
_q(electronic bk. : oBook)
020 _a1119561507
_q(electronic bk. : oBook)
020 _a9781119561484
_q(electronic bk.)
020 _a1119561485
_q(electronic bk.)
020 _a1119561515
020 _a9781119561514
_q(electronic bk.)
020 _z1119561450
020 _z9781119561453
029 1 _aUKMGB
_b019738701
029 1 _aAU@
_b000068069113
035 _a(OCoLC)1184234625
_z(OCoLC)1197737980
_z(OCoLC)1197768941
037 _a9781119561514
_bWiley
050 4 _aTK5105.59
082 0 4 _a005.8/7
_223
049 _aMAIN
100 1 _aHickey, Matthew.
_99169
245 1 0 _aHands on hacking /
_cMatthew Hickey with Jennifer Arcuri.
260 _aIndianapolis :
_bWiley,
_c2020.
300 _a1 online resource
336 _atext
_2rdacontent
337 _acomputer
_2rdamedia
338 _aonline resource
_2rdacarrier
505 0 _aHacking a Business Case -- Hacking Ethically and Legally -- Building Your Hack Box -- Open Source Intelligence Gathering -- The Domain Name System -- Electronic Mail -- The World Wide Web of Vulnerabilities -- Virtual Private Networks -- Files and File Sharing -- UNIX -- Databases -- Web Applications -- Microsoft Windows -- Passwords -- Writing Reports.
500 _aIncludes index.
650 0 _aHacking.
_97077
650 0 _aHacking
_xMoral and ethical aspects.
_99170
650 0 _aComputer security.
_93970
650 7 _aCOMPUTERS / Security / Network Security.
_2bisacsh
_98941
650 7 _aComputer security
_2fast
_0(OCoLC)fst00872484
_93970
650 7 _aHacking
_2fast
_0(OCoLC)fst01909643
_97077
655 4 _aElectronic books.
_93294
700 1 _aArcuri, Jennifer.
_99171
776 0 8 _iPrint version:
_z1119561450
_z9781119561453
_w(OCoLC)1085965089
856 4 0 _uhttps://doi.org/10.1002/9781119561507
_zWiley Online Library
942 _cEBK
994 _aC0
_bDG1
999 _c69309
_d69309