Exploiting software : how to break code Greg Hoglund , Gary McGraw
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
- 9780201786958
- QA76.9.A25H635 2004
![](/opac-tmpl/bootstrap/itemtypeimg/bridge/book.png)
Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
المكتبة الرئيسية الطابق الثاني أ | QA76.9.A25H635 2004 (Browse shelf(Opens below)) | 2 | Available | 0000105054 | ||
![]() |
المكتبة الرئيسية الطابق الثاني أ | QA76.9.A25H635 2004 (Browse shelf(Opens below)) | 1 | Available | 0000088125 |
Browsing المكتبة الرئيسية shelves, Shelving location: الطابق الثاني أ Close shelf browser (Hides shelf browser)
QA76.9.A25H36 2007 حماية أنظمة المعلومات | QA76.9.A25H37 2007 تكنولوجيا أمنية المعلومات و أنظمة الحماية Technology of information security and protection systems | QA76.9.A25H63 Modern methods for computer security and privacy | QA76.9.A25H635 2004 Exploiting software : how to break code | QA76.9.A25H635 2004 Exploiting software : how to break code | QA76.9.A25H68 2010 24 deadly sins of software security : programming flaws and how to fix them Twenty four deadly sins of software security | QA76.9.A25H69 2003 Writing secure code : practical strategies and proven techniques for building secure applications in a networked world |
5th printing July 2008 , t. p. - verso
Foreword by Aviel D. Rubin - on cover
Includes bibliographical references (p. 449-451) and index
There are no comments on this title.