000385833 000__ 01231cam\a2200349Ia\4500 000385833 001__ 385833 000385833 005__ 20210513135021.0 000385833 006__ m\\\\\\\\u\\\\\\\\ 000385833 007__ cr\cn||||||||| 000385833 008__ 060112s2006\\\\maua\\\\s\\\\\001\0\eng\d 000385833 020__ $$z9780080489520 000385833 020__ $$z1597490210 000385833 035__ $$a(CaPaEBR)ebr10110285 000385833 035__ $$a(OCoLC)647464696 000385833 040__ $$aCaPaEBR$$cCaPaEBR 000385833 05014 $$aQA76.9.A25$$b.P46 2006eb 000385833 08204 $$a005.8$$222 000385833 24500 $$aPenetration tester's open source toolkit$$h[electronic resource] /$$cJohnny Long ... [et al.] ; foreword by Max Moser. 000385833 24618 $$aPentester's open source toolkit 000385833 260__ $$aRockland, MA :$$bSyngress Pub.,$$c2006. 000385833 300__ $$axxix, 704 p. :$$bill. 000385833 500__ $$aIncludes index. 000385833 506__ $$aAccess limited to authorized users. 000385833 650_0 $$aHackers. 000385833 650_0 $$aComputer networks$$xSecurity measures. 000385833 650_0 $$aComputer security. 000385833 650_0 $$aElectronic information resources$$xAccess control. 000385833 655_7 $$aElectronic books.$$2lcsh 000385833 7001_ $$aLong, Johnny. 000385833 85280 $$bebk$$hProquest Ebook Central Academic Complete 000385833 85640 $$3ProQuest Ebook Central Academic Complete$$uhttps://univsouthin.idm.oclc.org/login?url=http://site.ebrary.com/lib/usiricelib/Doc?id=10110285$$zOnline Access 000385833 909CO $$ooai:library.usi.edu:385833$$pGLOBAL_SET 000385833 980__ $$aEBOOK 000385833 980__ $$aBIB 000385833 982__ $$aEbook 000385833 983__ $$aOnline