000767911 000__ 01653cam\a2200409\i\4500 000767911 001__ 767911 000767911 005__ 20210515122354.0 000767911 006__ m\\\\\o\\d\\\\\\\\ 000767911 007__ cr\cn\nnnunnun 000767911 008__ 151109t20152015inua\\\\ob\\\\001\0\eng\d 000767911 020__ $$z9781118987124 000767911 020__ $$a9781118987230$$q(electronic book) 000767911 020__ $$a9781118987087$$q(electronic book) 000767911 035__ $$a(MiAaPQ)ebr11113576 000767911 040__ $$aMiAaPQ$$beng$$erda$$epn$$cMiAaPQ$$dMiAaPQ 000767911 050_4 $$aHD30.38$$b.M668 2015eb 000767911 08204 $$a658.478$$223 000767911 1001_ $$aMonte, Matthew,$$eauthor. 000767911 24510 $$aNetwork attacks & exploitation :$$ba framework /$$cMatthew Monte. 000767911 2461_ $$aNetwork attacks and exploitation 000767911 264_1 $$aIndianapolis, Indiana :$$bWiley,$$c2015. 000767911 264_4 $$c©2015 000767911 300__ $$a1 online resource (196 pages) :$$billustrations. 000767911 336__ $$atext$$2rdacontent 000767911 337__ $$acomputer$$2rdamedia 000767911 338__ $$aonline resource$$2rdacarrier 000767911 504__ $$aIncludes bibliographical references and index. 000767911 506__ $$aAccess limited to authorized users. 000767911 588__ $$aDescription based on print version record. 000767911 650_0 $$aBusiness enterprises$$xComputer networks$$xSecurity measures. 000767911 650_0 $$aComputer security. 000767911 650_0 $$aComputer crimes$$xPrevention. 000767911 650_0 $$aCorporations$$xSecurity measures. 000767911 77608 $$iPrint version:$$aMonte, Matthew.$$tNetwork attacks & exploitation : a framework.$$dIndianapolis, Indiana : Wiley, c2015 $$z9781118987124 $$w(DLC) 2014958441 000767911 852__ $$bebk 000767911 85640 $$3ProQuest Ebook Central Academic Complete$$uhttps://univsouthin.idm.oclc.org/login?url=http://site.ebrary.com/lib/usiricelib/Doc?id=11113576$$zOnline Access 000767911 909CO $$ooai:library.usi.edu:767911$$pGLOBAL_SET 000767911 980__ $$aEBOOK 000767911 980__ $$aBIB 000767911 982__ $$aEbook 000767911 983__ $$aOnline