Hack attacks revealed : a complete reference with custom security hacking toolkit / John Chirillo
Material type:
TextPublication details: New York, N.Y. : Wiley Computer, c2001Description: 944 p. : ill. + 1 CD-ROMISBN: - 047141624X
- QA76.9 .A25 C447H
Books
| Home library | Collection | Shelving location | Call number | Status | Barcode | |
|---|---|---|---|---|---|---|
| BU Library and Learning Space | Books (CNFIC) | Closed Shelves (Contact Library Staff) | QA76.9 .A25 C447H (Browse shelf(Opens below)) | Available | 200207240054 |
Total holds: 0
Browsing BU Library and Learning Space shelves Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| QA76.9 .A25 C377F File system forensic analysis / | QA76.9.A25 C437B 2014 The basics of digital privacy : simple tools to protect your personal information and your identity online / | QA76.9 .A25 C447H Hack attacks denied : a complete guide to network lockdown / | QA76.9 .A25 C447H Hack attacks revealed : a complete reference with custom security hacking toolkit / | QA76.9 .A25 C447H 2002 Hack attacks revealed : a complete reference for UNIX, Windows, and Linux with custom security toolkit / | QA76.9 .A25 C447H 2002 Hack attacks denied : a complete guide to network lockdown for UNIX, Windows, and Linux / | QA76.9 .A25 C667 Contemporary cryptoloty : the science of information integrity |
Includes bibliographical references and index
There are no comments on this title.
Log in to your account to post a comment.
