001386821 000__ 01633nam\a22004451i\4500 001386821 001__ 1386821 001386821 003__ NhCcYBP 001386821 005__ 20220120003116.0 001386821 006__ m\\\\\o\\d\\\\\\\\ 001386821 007__ cr\un\nnnunnun 001386821 008__ 220107s2021\\\\caua\\\\o\\\\\001\0\eng\d 001386821 020__ $$a9781718501553 $$q(electronic book) 001386821 020__ $$a1718501552 $$q(electronic book) 001386821 020__ $$z9781718501546 001386821 020__ $$z1718501544 001386821 040__ $$aNhCcYBP$$cNhCcYBP 001386821 050_4 $$aTK5105.8855$$b.L523 2021 001386821 08204 $$a025.042$$223 001386821 1001_ $$aLi, Vickie,$$eauthor. 001386821 24510 $$aBug bounty bootcamp :$$bthe guide to finding and reporting web vulnerabilities /$$cVickie Li. 001386821 264_1 $$aSan Francisco :$$bNo Starch Press,$$c[2021] 001386821 300__ $$a1 online resource (xxiv, 390 pages) :$$billustrations. 001386821 336__ $$atext$$btxt$$2rdacontent 001386821 337__ $$acomputer$$bc$$2rdamedia 001386821 338__ $$aonline resource$$bcr$$2rdacarrier 001386821 500__ $$aIncludes index. 001386821 506__ $$aAccess limited to authorized users 001386821 533__ $$aElectronic reproduction.$$bAnn Arbor, MI$$nAvailable via World Wide Web. 001386821 588__ $$aDescription based on print version record. 001386821 650_0 $$aWeb sites$$xSecurity measures. 001386821 650_0 $$aPenetration testing (Computer security) 001386821 650_0 $$aDebugging in computer science. 001386821 655_0 $$aElectronic books 001386821 7102_ $$aProQuest (Firm) 001386821 77608 $$iPrint version:$$z9781718501546$$z1718501544$$w(DLC) 2021023153 001386821 852__ $$bebk 001386821 85640 $$3GOBI DDA$$uhttps://univsouthin.idm.oclc.org/login?url=https://ebookcentral.proquest.com/lib/usiricelib-ebooks/detail.action?docID=6711848$$zOnline Access 001386821 909CO $$ooai:library.usi.edu:1386821$$pGLOBAL_SET 001386821 980__ $$aBIB 001386821 980__ $$aEBOOK 001386821 982__ $$aEbook 001386821 983__ $$aOnline