|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1020288734 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
180124s2017 enka o 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d STF
|d OCLCF
|d TOH
|d CEF
|d KSU
|d DEBBG
|d TEFOD
|d G3B
|d S9I
|d UAB
|d AU@
|d N$T
|d VT2
|d OCLCQ
|d OCLCO
|d NZAUC
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1223325978
|a 1351839867
|
020 |
|
|
|a 9781788629577
|q (electronic bk.)
|
020 |
|
|
|a 1788629574
|q (electronic bk.)
|
020 |
|
|
|a 1788625005
|
020 |
|
|
|a 9781788625005
|
029 |
1 |
|
|a GBVCP
|b 1014940869
|
035 |
|
|
|a (OCoLC)1020288734
|z (OCoLC)1223325978
|z (OCoLC)1351839867
|
037 |
|
|
|a CL0500000932
|b Safari Books Online
|
037 |
|
|
|a 615430DB-EEA7-4026-99EF-D09DD1C94432
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a BUS
|x 032000
|2 bisacsh
|
072 |
|
7 |
|a SOC
|x 000000
|2 bisacsh
|
082 |
0 |
4 |
|a 363.25968
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Parasram, Shiva V. N.,
|e author.
|
245 |
1 |
0 |
|a Digital forensics with Kali Linux :
|b perform data acquisition, digital investigation, and threat analysis using Kali Linux tools /
|c Shiva V.N. Parasram.
|
264 |
|
1 |
|a Birmingham, UK :
|b Packt Publishing,
|c 2017.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed January 18, 2018).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Kali Linux.
|
630 |
0 |
7 |
|a Kali Linux
|2 fast
|
650 |
|
0 |
|a Computer crimes
|x Investigation.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
6 |
|a Criminalité informatique
|x Enquêtes.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
7 |
|a Coding theory & cryptology.
|2 bicssc
|
650 |
|
7 |
|a Computer security.
|2 bicssc
|
650 |
|
7 |
|a Data encryption.
|2 bicssc
|
650 |
|
7 |
|a Operating systems.
|2 bicssc
|
650 |
|
7 |
|a Computers
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computers
|x Security
|x Cryptography.
|2 bisacsh
|
650 |
|
7 |
|a Computers
|x Operating Systems
|x UNIX.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Infrastructure.
|2 bisacsh
|
650 |
|
7 |
|a SOCIAL SCIENCE
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer crimes
|x Investigation
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781788625005/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1672104
|
994 |
|
|
|a 92
|b IZTAP
|