LEADER 01593nam a2200325 i 4500 001 991002363989707536 008 131113s2003 it a b 001 0 ita d 020 $a8838643199 035 $ab14162441-39ule_inst 040 $aBibl. Dip.le Aggr. Ingegneria Innovazione - Sez. Ingegneria Innovazione$beng 082 04$a005.8$221 100 1 $aChirillo, John$0479148 245 10$aHacker: la difesa /$cJohn Chirillo 250 $a2nd ed. 260 $aMilano :$bMcGraw-Hill.,$cc2003 300 $avii, 683 p. :$bill. ;$c24 cm. ;$e1 CD-ROM 490 0 $aInformatica professionale 500 $aOrig. Title :Hack attacks denied : a complete guide to network lockdown for UNIX, Windows, and Linux 500 $aIncludes index 500 $aCover title: Hacker la difesa : una guida completa alla protezione di reti Unix, Windows e Linux 650 0$aComputer security 650 0$aComputer networks$xSecurity measures 907 $a.b14162441$b06-04-22$c13-11-13 912 $a991002363989707536 945 $aLE026 005.8 CHI 01.01 C.1 2003$cC.1$g1$i2026000018256$lle026$nFondo GISI$og$pE0.00$q-$rl$s- $t0$u1$v0$w1$x0$y.i1555305x$z13-11-13 945 $aLE026 005.8 CHI 01.01 C.2 2003$cC.2$g1$i2026000134819$lle026$mTesto collocato sul pavimento.$nTesto donato senza cd-rom.$nFondo GISI$op$pE0.00$q-$rl$st $t0$u0$v0$w0$x0$y.i16006100$z06-04-22 945 $aLE026 cd-rom n. 79$cC.1 cd$g1$i2026000035048$lle026$nFondo GISI$og$pE0.00$q-$rl$s- $t0$u1$v0$w1$x0$y.i15553061$z13-11-13 996 $aHacker$9669872 997 $aUNISALENTO 998 $ale026$b13-11-13$cm$da $e-$fita$git $h0$i0