Exploiting software how to break code

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Hoglund, Greg (VerfasserIn), MacGraw, Gary (VerfasserIn)
Format: Buch
Sprache:English
Veröffentlicht: Boston [u.a.] Addison-Wesley 2004
Ausgabe:2. print.
Schlagworte:
Online-Zugang:Table of contents
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 c 4500
001 BV026479555
003 DE-604
005 20110228
007 t
008 110326s2004 ad|| |||| 00||| eng d
010 |a 2003025556 
020 |a 0201786958  |9 0-201-78695-8 
035 |a (OCoLC)845619436 
035 |a (DE-599)BVBBV026479555 
040 |a DE-604  |b ger  |e rakwb 
041 0 |a eng 
049 |a DE-188 
082 0 |a 005.8 
100 1 |a Hoglund, Greg  |e Verfasser  |0 (DE-588)130649589  |4 aut 
245 1 0 |a Exploiting software  |b how to break code  |c Greg Hoglund ; Gary McGraw 
250 |a 2. print. 
264 1 |a Boston [u.a.]  |b Addison-Wesley  |c 2004 
300 |a XXXV, 471 S.  |b Ill., graph. Darst. 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
500 |a Includes bibliographical references (p. 449-451) and index 
650 0 7 |a Softwareschutz  |0 (DE-588)4131649-6  |2 gnd  |9 rswk-swf 
650 0 7 |a Computerkriminalität  |0 (DE-588)4010452-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Hacker  |0 (DE-588)4113821-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Software  |0 (DE-588)4055382-6  |2 gnd  |9 rswk-swf 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
689 0 0 |a Computerkriminalität  |0 (DE-588)4010452-7  |D s 
689 0 |5 DE-604 
689 1 0 |a Software  |0 (DE-588)4055382-6  |D s 
689 1 1 |a Hacker  |0 (DE-588)4113821-1  |D s 
689 1 2 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 1 |8 1\p  |5 DE-604 
689 2 0 |a Software  |0 (DE-588)4055382-6  |D s 
689 2 1 |a Softwareschutz  |0 (DE-588)4131649-6  |D s 
689 2 |8 2\p  |5 DE-604 
700 1 |a MacGraw, Gary  |e Verfasser  |4 aut 
856 4 |u http://www.loc.gov/catdir/toc/ecip0411/2003025556.html  |3 Table of contents 
999 |a oai:aleph.bib-bvb.de:BVB01-022048483 
883 1 |8 1\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
883 1 |8 2\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 

Datensatz im Suchindex

_version_ 1804145056329760768
any_adam_object
author Hoglund, Greg
MacGraw, Gary
author_GND (DE-588)130649589
author_facet Hoglund, Greg
MacGraw, Gary
author_role aut
aut
author_sort Hoglund, Greg
author_variant g h gh
g m gm
building Verbundindex
bvnumber BV026479555
ctrlnum (OCoLC)845619436
(DE-599)BVBBV026479555
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
edition 2. print.
format Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01911nam a2200517 c 4500</leader><controlfield tag="001">BV026479555</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20110228 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">110326s2004 ad|| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2003025556</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0201786958</subfield><subfield code="9">0-201-78695-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)845619436</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV026479555</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-188</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hoglund, Greg</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)130649589</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Exploiting software</subfield><subfield code="b">how to break code</subfield><subfield code="c">Greg Hoglund ; Gary McGraw</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. print.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston [u.a.]</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXXV, 471 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 449-451) and index</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareschutz</subfield><subfield code="0">(DE-588)4131649-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Software</subfield><subfield code="0">(DE-588)4055382-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Software</subfield><subfield code="0">(DE-588)4055382-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Software</subfield><subfield code="0">(DE-588)4055382-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Softwareschutz</subfield><subfield code="0">(DE-588)4131649-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">MacGraw, Gary</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/toc/ecip0411/2003025556.html</subfield><subfield code="3">Table of contents</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-022048483</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection>
id DE-604.BV026479555
illustrated Illustrated
indexdate 2024-07-09T23:13:23Z
institution BVB
isbn 0201786958
language English
lccn 2003025556
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-022048483
oclc_num 845619436
open_access_boolean
owner DE-188
owner_facet DE-188
physical XXXV, 471 S. Ill., graph. Darst.
publishDate 2004
publishDateSearch 2004
publishDateSort 2004
publisher Addison-Wesley
record_format marc
spelling Hoglund, Greg Verfasser (DE-588)130649589 aut
Exploiting software how to break code Greg Hoglund ; Gary McGraw
2. print.
Boston [u.a.] Addison-Wesley 2004
XXXV, 471 S. Ill., graph. Darst.
txt rdacontent
n rdamedia
nc rdacarrier
Includes bibliographical references (p. 449-451) and index
Softwareschutz (DE-588)4131649-6 gnd rswk-swf
Computerkriminalität (DE-588)4010452-7 gnd rswk-swf
Hacker (DE-588)4113821-1 gnd rswk-swf
Software (DE-588)4055382-6 gnd rswk-swf
Datensicherung (DE-588)4011144-1 gnd rswk-swf
Computerkriminalität (DE-588)4010452-7 s
DE-604
Software (DE-588)4055382-6 s
Hacker (DE-588)4113821-1 s
Datensicherung (DE-588)4011144-1 s
1\p DE-604
Softwareschutz (DE-588)4131649-6 s
2\p DE-604
MacGraw, Gary Verfasser aut
http://www.loc.gov/catdir/toc/ecip0411/2003025556.html Table of contents
1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk
2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk
spellingShingle Hoglund, Greg
MacGraw, Gary
Exploiting software how to break code
Softwareschutz (DE-588)4131649-6 gnd
Computerkriminalität (DE-588)4010452-7 gnd
Hacker (DE-588)4113821-1 gnd
Software (DE-588)4055382-6 gnd
Datensicherung (DE-588)4011144-1 gnd
subject_GND (DE-588)4131649-6
(DE-588)4010452-7
(DE-588)4113821-1
(DE-588)4055382-6
(DE-588)4011144-1
title Exploiting software how to break code
title_auth Exploiting software how to break code
title_exact_search Exploiting software how to break code
title_full Exploiting software how to break code Greg Hoglund ; Gary McGraw
title_fullStr Exploiting software how to break code Greg Hoglund ; Gary McGraw
title_full_unstemmed Exploiting software how to break code Greg Hoglund ; Gary McGraw
title_short Exploiting software
title_sort exploiting software how to break code
title_sub how to break code
topic Softwareschutz (DE-588)4131649-6 gnd
Computerkriminalität (DE-588)4010452-7 gnd
Hacker (DE-588)4113821-1 gnd
Software (DE-588)4055382-6 gnd
Datensicherung (DE-588)4011144-1 gnd
topic_facet Softwareschutz
Computerkriminalität
Hacker
Software
Datensicherung
url http://www.loc.gov/catdir/toc/ecip0411/2003025556.html
work_keys_str_mv AT hoglundgreg exploitingsoftwarehowtobreakcode
AT macgrawgary exploitingsoftwarehowtobreakcode