|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn354465315 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
090528s2004 gw ob 001 0 ger d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCF
|d OCLCQ
|d OCLCA
|d CEF
|d OCLCO
|d OCLCQ
|
020 |
|
|
|a 9783898641920
|
020 |
|
|
|a 3898641929
|
029 |
1 |
|
|a AU@
|b 000071511485
|
029 |
1 |
|
|a DEBSZ
|b 355458195
|
029 |
1 |
|
|a HEBIS
|b 291527728
|
035 |
|
|
|a (OCoLC)354465315
|
037 |
|
|
|a CL0500000039
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|b K56 2004
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Klein, Tobias.
|
245 |
1 |
0 |
|a Buffer-Overflows und Format-String-Schwachstellen :
|b Funktionsweisen, Exploits und Gegenmassnahmen /
|c Tobias Klein.
|
250 |
|
|
|a 1. Aufl.
|
260 |
|
|
|a Heidelberg :
|b Dpunkt-Verl.,
|c 2004.
|
300 |
|
|
|a 1 online resource (vii, 663 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Title from resource description page (viewed Apr 14, 2009).
|
504 |
|
|
|a Includes bibliographical references (pages 649-657) and index.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Buffer storage (Computer science)
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Ordinateurs
|x Mémoires tampons.
|
650 |
|
7 |
|a Computer security.
|2 blmlsh
|
650 |
|
7 |
|a Buffer storage (Computer science)
|2 blmlsh
|
650 |
|
7 |
|a Buffer storage (Computer science)
|2 fast
|0 (OCoLC)fst00840470
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9783898641920/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|