|
|
|
|
LEADER |
01618nmm a2200433 i 4500 |
001 |
ebook-27309565X |
005 |
20231110154511.0 |
007 |
cu|uuu---uuuuu |
008 |
231110s2023||||uk ||||g|||| ||||||eng d |
020 |
|
|
|a 9781837636600
|
035 |
|
|
|a (OCoLC)1411704055
|
035 |
|
|
|a FRCYB88946745
|
035 |
|
|
|a FRCYB26088946745
|
035 |
|
|
|a FRCYB19188946745
|
035 |
|
|
|a FRCYB27488946745
|
035 |
|
|
|a FRCYB24788946745
|
035 |
|
|
|a FRCYB24888946745
|
035 |
|
|
|a FRCYB29388946745
|
035 |
|
|
|a FRCYB084688946745
|
035 |
|
|
|a FRCYB087588946745
|
035 |
|
|
|a FRCYB087088946745
|
035 |
|
|
|a FRCYB56788946745
|
040 |
|
|
|a ABES
|b fre
|e AFNOR
|
041 |
0 |
|
|a eng
|2 639-2
|
100 |
1 |
|
|0 (IdRef)242401236
|1 http://www.idref.fr/242401236/id
|a Singh, Glen D..
|4 aut.
|e Auteur
|
245 |
1 |
0 |
|a Reconnaissance for Ethical Hackers :
|b Focus on the starting point of data breaches and explore essential steps for successful pentesting
|c Glen D. Singh.
|
264 |
|
1 |
|a Birmingham :
|b Packt Publishing.
|
264 |
|
2 |
|a Paris :
|b Cyberlibris,
|c 2023.
|
336 |
|
|
|b txt
|2 rdacontent
|
337 |
|
|
|b c
|2 rdamedia
|
337 |
|
|
|b b
|2 isbdmedia
|
338 |
|
|
|b ceb
|2 RDAfrCarrier
|
500 |
|
|
|a Couverture (https://static2.cyberlibris.com/books_upload/136pix/9781837636600.jpg).
|
506 |
|
|
|a L'accès en ligne est réservé aux établissements ou bibliothèques ayant souscrit l'abonnement
|e Cyberlibris
|
856 |
|
|
|q HTML
|u https://srvext.uco.fr/login?url=https://univ.scholarvox.com/book/88946745
|w Données éditeur
|z Accès à l'E-book
|
886 |
2 |
|
|2 unimarc
|a 181
|a i#
|b xxxe##
|
993 |
|
|
|a E-Book
|
994 |
|
|
|a BNUM
|
995 |
|
|
|a 27309565X
|