LEADER 01099nam0-22003371i-450- 001 990002900230403321 010 $a88-458-0208-6 035 $a000290023 035 $aFED01000290023 035 $a(Aleph)000290023FED01 035 $a000290023 100 $a20000920d1999----km-y0itay50------ba 101 0 $aITA 200 1 $a<>bilanci consuntivi degli enti previdenziali$eanno 1997$fIstituto Nazionale di Statistica 210 $aRoma$cIstat$d1999 215 $a53 p.$d30 cm 225 1 $aInformazioni$fIstat$v16 300 $aIn testa al frontespizio: "Sistema statistico nazionale. Istituto Nazionale di Statistica" 300 $aSettore pubblica amministrazione 610 0 $aItalia$astatistiche finanziarie$a1996 610 0 $aBilanci consuntivi$aenti previdenziali$aItalia$a1996 676 $a352.01 700 1$aIstat$0445627 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990002900230403321 952 $aCDI-I-16-99-Pos-2$b6918$fMAS 959 $aMAS 996 $aBilanci consuntivi degli enti previdenziali$9466022 997 $aUNINA DB $aING01 LEADER 00966nam--2200337---450- 001 990000335560203316 010 $a0-8311-1176-3 035 $a0033556 035 $aUSA010033556 035 $a(ALEPH)000033556USA01 035 $a0033556 100 $a20010206d1987----km-y0itay0103----ba 101 $aeng 102 $aUS 105 $a||||||||001yy 200 1 $aApplication of metal cutting theory$fFryderyk E.Gorczyca 210 $aNew York$cIndustrial Press$dcopyr.1987 215 $aXV, 298 p.$d24 cm 461 1$1001-------$12001 606 0 $aMetalli$xTaglio 676 $a671.53 700 1$aGORCZYCA,$bFryderyk$0542883 912 $a990000335560203316 951 $a671.53 APP$b15817 Ing.$c671.53$d00069365 959 $aBK 969 $aTEC 979 $aTAMI$b40$c20010206$lUSA01$h1006 979 $c20020403$lUSA01$h1641 979 $aPATRY$b90$c20040406$lUSA01$h1623 996 $aApplication of metal cutting theory$9878067 997 $aUNISA LEADER 01030nam--2200361---450- 001 990002971330203316 005 20090609154519.0 035 $a000297133 035 $aUSA01000297133 035 $a(ALEPH)000297133USA01 035 $a000297133 100 $a20070911d1946----km-y0itay50------ba 101 $aita 102 $aIT 105 $a||||||||001yy 200 1 $aChronologie de l'histoire mondiale$fE. Cavaignac 205 $a3. ed. revue et augmentee 210 $aParis$cPayot$d1946 215 $a238 p.$d24 cm 225 2 $aBibliotheque historique Payot 410 0$12001$aBibliotheque historique Payot 606 0 $aStoria$xCronologia 676 $a902.02 700 1$aCAVAIGNAC,$bEugene$0138652 801 0$aIT$bsalbc$gISBD 912 $a990002971330203316 951 $aFC M 2253$b5004 DLM$cFC M 959 $aBK 969 $aDILAM 979 $aDILAM$b90$c20070911$lUSA01$h1218 979 $aDILAM1$b90$c20090609$lUSA01$h1545 996 $aChronologie de l'histoire mondiale$9609765 997 $aUNISA LEADER 03735nam 2200661Ia 450 001 9910781161203321 005 20230725045118.0 010 $a1-282-68350-0 010 $a9786612683503 010 $a0-470-64286-6 035 $a(CKB)2550000000013627 035 $a(EBL)516952 035 $a(OCoLC)635955021 035 $a(SSID)ssj0000404185 035 $a(PQKBManifestationID)11278728 035 $a(PQKBTitleCode)TC0000404185 035 $a(PQKBWorkID)10341131 035 $a(PQKB)10763189 035 $a(MiAaPQ)EBC516952 035 $a(CaSebORM)9780470525203 035 $a(Au-PeEL)EBL516952 035 $a(CaPaEBR)ebr10383604 035 $a(CaONFJC)MIL268350 035 $a(EXLCZ)992550000000013627 100 $a20100202d2010 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCEH$b[electronic resource] $ecertified ethical hacker study guide /$fKimberly Graves 205 $a1st ed. 210 $aIndianapolis, IN $cWiley$d2010 215 $a1 online resource (439 p.) 300 $aDescription based upon print version of record. 311 $a0-470-52520-7 320 $aIncludes bibliographical references and index. 327 $aCEH: Certified Ethical Hacker Study Guide; Acknowledgments; About the Author; Contents at a Glance; Contents; Table of Exercises; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Introduction to Ethical Hacking, Ethics, and Legality; Chapter 2: Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering; Chapter 3: Gathering Network and Host Information: Scanning and Enumeration; Chapter 4: System Hacking: Password Cracking, Escalating Privileges, and Hiding Files; Chapter 5: Trojans, Backdoors, Viruses, and Worms 327 $aChapter 6: Gathering Data from Networks: SniffersChapter 7: Denial of Service and Session Hijacking; Chapter 8: Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques; Chapter 9: Attacking Applications: SQL Injection and Buffer Overflows; Chapter 10: Wireless Network Hacking; Chapter 11: Physical Site Security; Chapter 12: Hacking Linux Systems; Chapter 13: Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls; Chapter 14: Cryptography; Chapter 15: Performing a Penetration Test; Appendix: About the Companion CD; Glossary 327 $aIndex 330 $aFull Coverage of All Exam Objectives for the CEH Exams 312-50 and EC0-350 Thoroughly prepare for the challenging CEH Certified Ethical Hackers exam with this comprehensive study guide. The book provides full coverage of exam topics, real-world examples, and includes a CD with chapter review questions, two full-length practice exams, electronic flashcards, a glossary of key terms, and the entire book in a searchable pdf e-book. What's Inside: Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial 606 $aElectronic data processing personnel$xCertification 606 $aComputer security$xExaminations$vStudy guides 606 $aComputer hackers$xExaminations$vStudy guides 606 $aComputer networks$xExaminations$vStudy guides 615 0$aElectronic data processing personnel$xCertification. 615 0$aComputer security$xExaminations 615 0$aComputer hackers$xExaminations 615 0$aComputer networks$xExaminations 676 $a005.8 700 $aGraves$b Kimberly$f1974-$01471107 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910781161203321 996 $aCEH$93683273 997 $aUNINA