|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBSCO_on1015882139 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
171223s2017 enk o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d MERUC
|d CHVBK
|d OCLCO
|d IDB
|d YDX
|d OCLCA
|d OCLCQ
|d OCLCF
|d N$T
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1014438638
|a 1264978458
|
020 |
|
|
|a 1788628551
|
020 |
|
|
|a 9781788628556
|q (electronic bk.)
|
029 |
1 |
|
|a CHNEW
|b 000981705
|
029 |
1 |
|
|a CHVBK
|b 507496833
|
035 |
|
|
|a (OCoLC)1015882139
|z (OCoLC)1014438638
|z (OCoLC)1264978458
|
050 |
|
4 |
|a QA76.9.A25
|b .R343 2017
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Rahalkar, Sagar.
|
245 |
1 |
0 |
|a Metasploit Revealed.
|
260 |
|
|
|a Birmingham :
|b Packt Publishing,
|c 2017.
|
300 |
|
|
|a 1 online resource (734 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Metasploit.
|
650 |
|
0 |
|a Computers
|x Access control.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Ordinateurs
|x Accès
|x Contrôle.
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Computers
|x Access control.
|2 fast
|0 (OCoLC)fst00872779
|
700 |
1 |
|
|a Jaswal, Nipun.
|
776 |
0 |
8 |
|i Print version:
|a Rahalkar, Sagar.
|t Metasploit Revealed: Secrets of the Expert Pentester.
|d Birmingham : Packt Publishing, ©2017
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1649951
|z Texto completo
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL5178187
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15029780
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1649951
|
994 |
|
|
|a 92
|b IZTAP
|