000866043 000__ 01611cam\a2200433Ii\4500 000866043 001__ 866043 000866043 005__ 20230306145808.0 000866043 006__ m\\\\\o\\d\\\\\\\\ 000866043 007__ cr\cn\nnnunnun 000866043 008__ 190311s2019\\\\cau\\\\\o\\\\\001\0\eng\d 000866043 019__ $$a1089857278$$a1090037196$$a1091325334 000866043 020__ $$a9781484243091$$q(electronic book) 000866043 020__ $$a1484243099$$q(electronic book) 000866043 020__ $$z9781484243084 000866043 020__ $$z1484243080 000866043 0247_ $$a10.1007/978-1-4842-4309-1$$2doi 000866043 035__ $$aSP(OCoLC)on1089683288 000866043 035__ $$aSP(OCoLC)1089683288$$z(OCoLC)1089857278$$z(OCoLC)1090037196$$z(OCoLC)1091325334 000866043 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dGW5XE$$dN$T$$dEBLCP$$dYDX$$dUPM$$dUKMGB 000866043 049__ $$aISEA 000866043 050_4 $$aQA76.9.A25 000866043 08204 $$a005.8$$223 000866043 1001_ $$aOakley, Jacob G.,$$eauthor. 000866043 24510 $$aProfessional Red teaming :$$bconducting successful cybersecurity engagements /$$cJacob G. Oakley. 000866043 264_1 $$a[Berkeley, CA] :$$bApress,$$c2019. 000866043 300__ $$a1 online resource 000866043 336__ $$atext$$btxt$$2rdacontent 000866043 337__ $$acomputer$$bc$$2rdamedia 000866043 338__ $$aonline resource$$bcr$$2rdacarrier 000866043 347__ $$atext file$$bPDF$$2rda 000866043 500__ $$aIncludes index. 000866043 506__ $$aAccess limited to authorized users. 000866043 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed March 13, 2019). 000866043 650_0 $$aComputer security. 000866043 77608 $$iPrint version: $$z1484243080$$z9781484243084$$w(OCoLC)1071867367 000866043 852__ $$bebk 000866043 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-1-4842-4309-1$$zOnline Access$$91397441.1 000866043 909CO $$ooai:library.usi.edu:866043$$pGLOBAL_SET 000866043 980__ $$aEBOOK 000866043 980__ $$aBIB 000866043 982__ $$aEbook 000866043 983__ $$aOnline 000866043 994__ $$a92$$bISE