Hack attacks revealed : a complete reference with custom security hacking toolkit / John Chirillo
By: Chirillo, John.
Material type: BookPublisher: New York, N.Y. : Wiley Computer, c2001Description: 944 p. : ill. + 1 CD-ROM.ISBN: 047141624X.Call No.: QA76.9 .A25 C447H Subject(s): COMPUTER SECURITY | COMPUTER NETWORKS -- SECURITY MEASURESBibliography, etc. Note: Includes bibliographical references and indexCurrent location | Call number | Status | Date due | Barcode |
---|---|---|---|---|
Main Campus Book Shelves | QA76.9 .A25 C447H (Browse shelf) | Available | 200207240054 |
Browsing Main Campus Shelves , Shelving location: Book Shelves Close shelf browser
QA76.9 .A25 C377F File system forensic analysis / | QA76.9.A25 C437B 2014 The basics of digital privacy : simple tools to protect your personal information and your identity online / | QA76.9 .A25 C447H Hack attacks denied : | QA76.9 .A25 C447H Hack attacks revealed : | QA76.9 .A25 C447H 2002 Hack attacks revealed : a complete reference for UNIX, Windows, and Linux with custom security toolkit / | QA76.9 .A25 C447H 2002 Hack attacks denied : a complete guide to network lockdown for UNIX, Windows, and Linux / | QA76.9 .A25 C667 Contemporary cryptoloty : the science of information integrity |
Includes bibliographical references and index
There are no comments for this item.