LEADER 01496nam 2200337Ia 450 001 996397033503316 005 20200824132911.0 035 $a(CKB)4940000000064257 035 $a(EEBO)2264210827 035 $a(OCoLC)ocm9713646e 035 $a(OCoLC)9713646 035 $a(EXLCZ)994940000000064257 100 $a19830718d1683 uy | 101 0 $aeng 135 $aurbn||||a|bb| 200 10$aTruth's vindication, or, A gentle stroke to wipe off the foul aspersions, false accusations, and misrepresentations cast upon the people of God called Quakers$b[electronic resource] $eboth with respect to their principle and their way of proselyting people over to them : also an epistle to such of the Friends of Christ that have lately been convinced of the truth as it is in Jesus 210 $aLondon $cPrinted, sold by W.S. and J.B.$d1983 [i.e. 1683] 215 $a[14], 165 p 300 $aSigned: Elizabeth Bathurst. 300 $aReproduction of original in the Union Theological Seminary Library, New York. 330 $aeebo-0160 606 $aSociety of Friends$vApologetic works 615 0$aSociety of Friends 700 $aBathurst$b Elizabeth$fd. 1691.$01005419 801 0$bUMI 801 1$bUMI 801 2$bWaOLN 906 $aBOOK 912 $a996397033503316 996 $aTruth's vindication or, A gentle stroke to wipe off the foul aspersions, false accusations and misrepresentations, cast upon the people of God, called, Quakers$92311556 997 $aUNISA LEADER 01754nam a2200277 i 4500 001 991000652719707536 008 080513s2007 caua b 001 0 eng d 020 $a0596009631 020 $a9780596009632 035 $ab13890463-39ule_inst 040 $aDip.to Ingegneria dell'Innovazione$beng 082 0 $a005.8$222 245 00$aSecurity power tools /$cBryan Burns ... [et al.] 260 $aBeijing :$bO'Reilly,$cc2007 300 $axxxii, 822 p. :$bill. ;$c24 cm 504 $aIncludes bibliographical references and index 505 0 $aPart 1. Legal and ethics. Legal and ethics issues -- Part 2. Reconnaissance. Network scanning -- Vulnerability scanning -- LAN reconnaissance -- Wireless reconnaissance -- Custom packet generation -- Part 3. Penetration. Metasploit -- Wireless penetration -- Exploitation framework applications -- Custom exploitation -- Part 4. Control. Backdoors -- Rootkits -- Part 5. Defense. Proactive defense : firewalls -- Host hardening -- Securing communications -- Email security and anti-spam -- Device security testing -- Part 6. Monitoring. Network capture -- Network monitoring -- Host monitoring -- Part 7. Discovery. Forensics -- Application fuzzing -- Binary reverse engineering. 650 4$aComputer networks$xSecurity measures 650 4$aComputer security 700 1 $aBurns, Bryan$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0151784 907 $a.b13890463$b28-01-14$c24-03-10 912 $a991000652719707536 945 $aLE026 005.8 D BUR 01.01 2007$g1$i2026000055701$lle026$nProf. Tommasi / Biblioteca$op$pE46.89$q-$rn$s- $t1$u0$v0$w0$x0$y.i15098217$z25-03-10 996 $aSecurity power tools$91440779 997 $aUNISALENTO 998 $ale026$b13-05-08$cm$da $e-$feng$gcc $h0$i0