MARC보기
LDR01713cmm u2200433Ii 4500
001000000313493
003OCoLC
00520230525154731
006m d
007cr unu||||||||
008181003s2018 enka o 000 0 eng d
020 ▼a 9781788624725 ▼q (electronic bk.)
020 ▼a 1788624726 ▼q (electronic bk.)
020 ▼z 9781788627252
035 ▼a 1883885 ▼b (N$T)
035 ▼a (OCoLC)1055555635
037 ▼a CL0500000995 ▼b Safari Books Online
037 ▼a B13C9F25-6435-4878-849E-243BB03BD264 ▼b OverDrive, Inc. ▼n http://www.overdrive.com
040 ▼a UMI ▼b eng ▼e rda ▼e pn ▼c UMI ▼d N$T ▼d TEFOD ▼d N$T ▼d 248032
049 ▼a MAIN
050 4 ▼a TK5105.59
072 7 ▼a COM ▼x 000000 ▼2 bisacsh
08204 ▼a 005.8 ▼2 23
1001 ▼a Rahalkar, Sagar, ▼e author.
24510 ▼a Network vulnerability assessment : ▼b identify security loopholes in your network's infrastructure / ▼c Sagar Rahalkar.
260 ▼a Birmingham, UK : ▼b Packt Publishing, ▼c 2018.
300 ▼a 1 online resource (1 volume) : ▼b illustrations
336 ▼a text ▼b txt ▼2 rdacontent
337 ▼a computer ▼b c ▼2 rdamedia
338 ▼a online resource ▼b cr ▼2 rdacarrier
588 ▼a Description based on online resource; title from title page (Safari, viewed October 1, 2018).
590 ▼a Master record variable field(s) change: 072, 082
650 7 ▼a COMPUTER SCIENCE / General ▼2 bisacsh
650 0 ▼a Computer networks ▼x Security measures ▼x Evaluation.
650 0 ▼a Computer network protocols ▼x Security measures ▼x Evaluation.
655 4 ▼a Electronic books.
85640 ▼3 EBSCOhost ▼u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1883885
938 ▼a EBSCOhost ▼b EBSC ▼n 1883885
990 ▼a 관리자
994 ▼a 92 ▼b N$T