|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn180989282 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
071109s2007 nju ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d OCLCG
|d OCLCQ
|d TXJ
|d CEF
|d OCLCQ
|d OCLCE
|d NHM
|d DEBSZ
|d OCLCQ
|d OCLCO
|d OCLCF
|d OCLCQ
|d AU@
|d OCLCQ
|d UAB
|d CNCEN
|d ERF
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 608543905
|a 646443843
|a 1044619388
|a 1056380515
|a 1074328956
|a 1083192018
|a 1112535470
|
020 |
|
|
|a 9780132271912
|
020 |
|
|
|a 0132271915
|
024 |
8 |
|
|a 9780132271912
|
029 |
1 |
|
|a AU@
|b 000067102485
|
029 |
1 |
|
|a DEBSZ
|b 355397730
|
029 |
1 |
|
|a HEBIS
|b 291470890
|
035 |
|
|
|a (OCoLC)180989282
|z (OCoLC)608543905
|z (OCoLC)646443843
|z (OCoLC)1044619388
|z (OCoLC)1056380515
|z (OCoLC)1074328956
|z (OCoLC)1083192018
|z (OCoLC)1112535470
|
037 |
|
|
|a CL0500000015
|b Safari Books Online
|
042 |
|
|
|a dlr
|
050 |
|
4 |
|a TK5105.59
|b .H64 2007
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Hoglund, Greg.
|
245 |
1 |
0 |
|a Exploiting online games :
|b cheating massively distributed systems /
|c by Greg Hoglund, Gary McGraw.
|
260 |
|
|
|a Upper Saddle River, N.J. :
|b Addison-Wesley,
|c 2007.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
490 |
1 |
|
|a Addison-Wesley software security series
|
505 |
0 |
|
|a Why games -- Game hacking 101 -- Money -- Enter the lawyers -- Infested with bugs -- Hacking game clients -- Building a bot -- Reversing -- Advanced game hacking fu -- Software security über alles.
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
520 |
1 |
|
|a "If you are a gamer, a game developer, a software security professional, or an interested bystander, this book exposes the inner workings of online-game security for all to see." "From the authors of the best-selling Exploiting Software, Exploiting Online Games takes a frank look at controversial security issues surrounding MMORPGs, such as World of Warcraft and Second Life. This no-holds-barred book comes fully loaded with code examples, debuggers, bots, and hacks."--Jacket
|
506 |
|
|
|3 Use copy
|f Restrictions unspecified
|2 star
|5 MiAaHDL
|
533 |
|
|
|a Electronic reproduction.
|b [Place of publication not identified] :
|c HathiTrust Digital Library,
|d 2010.
|5 MiAaHDL
|
538 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
|u http://purl.oclc.org/DLF/benchrepro0212
|5 MiAaHDL
|
583 |
1 |
|
|a digitized
|c 2010
|h HathiTrust Digital Library
|l committed to preserve
|2 pda
|5 MiAaHDL
|
542 |
|
|
|f Copyright © 2008 Pearson Education, Inc.
|g 2008
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Systèmes informatiques
|x Mesures de sûreté.
|2 ram
|
650 |
|
7 |
|a Réseaux d'ordinateurs.
|2 ram
|
700 |
1 |
|
|a McGraw, Gary,
|d 1966-
|
776 |
0 |
8 |
|i Print version:
|a Hoglund, Greg.
|t Exploiting online games.
|d Upper Saddle River, N.J. : Addison-Wesley, 2007
|w (DLC) 2007018716
|w (OCoLC)181296374
|
830 |
|
0 |
|a Addison-Wesley software security series.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780132271912/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|