Exploiting software : how to break code / Greg Hoglund, Gary McGraw.
Material type:
- 0201786958 (pbk. : alk. paper)
- 005.8Â 22
- QA 76.9Â .A25H635 2004
Item type | Current library | Call number | Status | Barcode | |
---|---|---|---|---|---|
Loan | Margaret Thatcher Library Second Floor | QA 76.9 .A25H635 2004 (Browse shelf(Opens below)) | Available | 4001689 |
Browsing Margaret Thatcher Library shelves,Shelving location: Second Floor Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
QA 76.9 .A25A54 2001 Security engineering : | QA 76.9.A25B69 Information assurance : | QA 76.9 .A25G6 1999 Check Point FireWall-1 : administration guide | QA 76.9 .A25H635 2004 Exploiting software : how to break code / | QA 76.9 .A25K33 Designing network security / | QA 76.9 .A25K345 1995 Network security : | QA 76.9 .A25M38 2001 Maximum Linux security : |
Includes bibliographical references (p. 449-451) and index.
There are no comments on this title.
Log in to your account to post a comment.