000 01739nam a2200433 i 4500
001 EBC4816492
003 MiAaPQ
005 20240123171320.0
006 m o d |
007 cr cnu||||||||
008 170316t20172017inu o 001 0 eng d
020 _z9781118918210
020 _a9781118918234
_q(electronic bk.)
035 _a(MiAaPQ)EBC4816492
035 _a(Au-PeEL)EBL4816492
035 _a(CaPaEBR)ebr11355747
035 _a(CaONFJC)MIL997866
035 _a(OCoLC)975223991
040 _aMiAaPQ
_beng
_erda
_epn
_cMiAaPQ
_dMiAaPQ
050 4 _aQA76.9.A25
_b.B855 2017
082 0 _a005.8
_223
100 1 _aBullock, Jessey,
_eauthor.
245 1 0 _aWireshark for security professionals :
_busing wireshark and the metasploit framework /
_cJessey Bullock, Jeff T. Parker.
264 1 _aIndianapolis, Indiana :
_bWiley,
_c2017.
264 4 _c2017
300 _a1 online resource (291 pages)
336 _atext
_2rdacontent
337 _acomputer
_2rdamedia
338 _aonline resource
_2rdacarrier
500 _aIncludes index.
588 _aDescription based on print version record.
590 _aElectronic reproduction. Ann Arbor, MI : ProQuest, 2016. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
650 0 _aComputer security.
655 4 _aElectronic books.
700 1 _aParker, Jeff T.,
_eauthor.
776 0 8 _iPrint version:
_aBullock, Jessey.
_tWireshark for security professionals : using wireshark and the metasploit framework.
_dIndianapolis, Indiana : Wiley, c2017
_h272 pages
_z9781118918210
_w2016946245
797 2 _aProQuest (Firm)
856 4 0 _uhttps://ebookcentral.proquest.com/lib/bacm-ebooks/detail.action?docID=4816492
_zClick to View
999 _c283392
_d283392