|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBOOKCENTRAL_ocm70720656 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
030801s2003 caua ob 001 0 eng d |
040 |
|
|
|a REDDC
|b eng
|e pn
|c REDDC
|d BAKER
|d OCLCQ
|d COO
|d NTG
|d WPG
|d YDXCP
|d OCLCE
|d OCLCQ
|d MERUC
|d CCO
|d E7B
|d VT2
|d MHW
|d CSU
|d B24X7
|d OCLCQ
|d OCLCF
|d DEBSZ
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCL
|d EBLCP
|d DXU
|d OCLCQ
|d AZK
|d MOR
|d PIFBR
|d ZCU
|d OCLCQ
|d CNNOR
|d LOA
|d OCLCQ
|d K6U
|d OCLCA
|d STF
|d U3W
|d D6H
|d BRL
|d WRM
|d OCLCQ
|d ICG
|d NRAMU
|d OCLCQ
|d AU@
|d WYU
|d A6Q
|d S9I
|d DKC
|d OCLCQ
|d CEF
|d HS0
|d UKCRE
|d BRF
|d EYM
|d LVT
|d INARC
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
016 |
7 |
|
|a 000024858451
|2 AU
|
019 |
|
|
|a 55234361
|a 63118738
|a 191037100
|a 301053005
|a 489558415
|a 559709989
|a 607164534
|a 647275609
|a 722194600
|a 740948567
|a 765142454
|a 961667855
|a 962588060
|a 988498575
|a 991988410
|a 1013532130
|a 1014372546
|a 1017957044
|a 1020145885
|a 1028758900
|a 1029503172
|a 1037430211
|a 1038661641
|a 1038771807
|a 1044932735
|a 1045527270
|a 1057980006
|a 1060195617
|a 1061054101
|a 1064157704
|a 1076313972
|a 1078477776
|a 1081188733
|a 1096473113
|a 1153499451
|a 1179724001
|a 1194801266
|a 1228553213
|a 1229785748
|a 1285566070
|
020 |
|
|
|a 1593270070
|
020 |
|
|
|a 9781593270070
|
020 |
|
|
|a 1593270879
|
020 |
|
|
|a 9781593270872
|
029 |
1 |
|
|a AU@
|b 000046703389
|
029 |
1 |
|
|a AU@
|b 000066772244
|
029 |
1 |
|
|a DEBSZ
|b 396097731
|
029 |
1 |
|
|a NZ1
|b 12008131
|
035 |
|
|
|a (OCoLC)70720656
|z (OCoLC)55234361
|z (OCoLC)63118738
|z (OCoLC)191037100
|z (OCoLC)301053005
|z (OCoLC)489558415
|z (OCoLC)559709989
|z (OCoLC)607164534
|z (OCoLC)647275609
|z (OCoLC)722194600
|z (OCoLC)740948567
|z (OCoLC)765142454
|z (OCoLC)961667855
|z (OCoLC)962588060
|z (OCoLC)988498575
|z (OCoLC)991988410
|z (OCoLC)1013532130
|z (OCoLC)1014372546
|z (OCoLC)1017957044
|z (OCoLC)1020145885
|z (OCoLC)1028758900
|z (OCoLC)1029503172
|z (OCoLC)1037430211
|z (OCoLC)1038661641
|z (OCoLC)1038771807
|z (OCoLC)1044932735
|z (OCoLC)1045527270
|z (OCoLC)1057980006
|z (OCoLC)1060195617
|z (OCoLC)1061054101
|z (OCoLC)1064157704
|z (OCoLC)1076313972
|z (OCoLC)1078477776
|z (OCoLC)1081188733
|z (OCoLC)1096473113
|z (OCoLC)1153499451
|z (OCoLC)1179724001
|z (OCoLC)1194801266
|z (OCoLC)1228553213
|z (OCoLC)1229785748
|z (OCoLC)1285566070
|
037 |
|
|
|a itpro
|
042 |
|
|
|a dlr
|
050 |
|
4 |
|a QA76.9.A25
|b E75 2003eb
|
082 |
0 |
4 |
|a 005.8
|2 22
|
084 |
|
|
|a 54.89
|2 bcl
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Erickson, Jon,
|d 1977-
|1 https://id.oclc.org/worldcat/entity/E39PBJpYwPcFr8fyF9CppjjKVC
|
245 |
1 |
0 |
|a Hacking :
|b the art of exploitation /
|c by Jon Erickson.
|
260 |
|
|
|a San Francisco :
|b No Starch Press,
|c ©2003.
|
300 |
|
|
|a 1 online resource (xi, 241 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
504 |
|
|
|a Includes bibliographical references (pages 230-232) and index.
|
505 |
0 |
|
|a Title; Acknowledgments; Preface; Brief Contents; Contents In Detail; Introduction; Programming; Networking; Cryptology; Conclusion; Index; Updates.
|
520 |
|
|
|a A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b
|
588 |
0 |
|
|a Print version record.
|
506 |
|
|
|3 Use copy
|f Restrictions unspecified
|2 star
|5 MiAaHDL
|
533 |
|
|
|a Electronic reproduction.
|b [Place of publication not identified] :
|c HathiTrust Digital Library,
|d 2010.
|5 MiAaHDL
|
538 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
|u http://purl.oclc.org/DLF/benchrepro0212
|5 MiAaHDL
|
583 |
1 |
|
|a digitized
|c 2010
|h HathiTrust Digital Library
|l committed to preserve
|2 pda
|5 MiAaHDL
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Hackers.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Pirates informatiques.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Hackers
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
1 |
7 |
|a Hacking.
|2 gtt
|
650 |
1 |
7 |
|a Computerbeveiliging.
|2 gtt
|
758 |
|
|
|i has work:
|a Hacking (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGR8wY8dTXJF3gV7jKRwcq
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Erickson, Jon (Jon Mark), 1977-
|t Hacking.
|d San Francisco : No Starch Press, ©2003
|w (DLC) 2003017498
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=273488
|z Texto completo
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00003311
|
938 |
|
|
|a Baker & Taylor
|b BKTY
|c 39.95
|d 29.96
|i 1593270070
|n 0004296291
|s active
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL273488
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10046093
|
938 |
|
|
|a Internet Archive
|b INAR
|n hackingartofexpl0000eric
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2626226
|
994 |
|
|
|a 92
|b IZTAP
|