Cargando…

The art of intrusion: the real stories behind the exploits of hackers, intruders, & deceivers

Detalles Bibliográficos
Autores principales: Mitnick, Kevin D, Simon, William L
Lenguaje:eng
Publicado: Wiley 2005
Materias:
Acceso en línea:http://cds.cern.ch/record/1519375
_version_ 1780928759439818752
author Mitnick, Kevin D
Simon, William L
author_facet Mitnick, Kevin D
Simon, William L
author_sort Mitnick, Kevin D
collection CERN
id cern-1519375
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2005
publisher Wiley
record_format invenio
spelling cern-15193752021-04-21T23:09:33Zhttp://cds.cern.ch/record/1519375engMitnick, Kevin DSimon, William LThe art of intrusion: the real stories behind the exploits of hackers, intruders, & deceivers Computing and ComputersWileyoai:cds.cern.ch:15193752005
spellingShingle Computing and Computers
Mitnick, Kevin D
Simon, William L
The art of intrusion: the real stories behind the exploits of hackers, intruders, & deceivers
title The art of intrusion: the real stories behind the exploits of hackers, intruders, & deceivers
title_full The art of intrusion: the real stories behind the exploits of hackers, intruders, & deceivers
title_fullStr The art of intrusion: the real stories behind the exploits of hackers, intruders, & deceivers
title_full_unstemmed The art of intrusion: the real stories behind the exploits of hackers, intruders, & deceivers
title_short The art of intrusion: the real stories behind the exploits of hackers, intruders, & deceivers
title_sort art of intrusion: the real stories behind the exploits of hackers, intruders, & deceivers
topic Computing and Computers
url http://cds.cern.ch/record/1519375
work_keys_str_mv AT mitnickkevind theartofintrusiontherealstoriesbehindtheexploitsofhackersintrudersdeceivers
AT simonwilliaml theartofintrusiontherealstoriesbehindtheexploitsofhackersintrudersdeceivers
AT mitnickkevind artofintrusiontherealstoriesbehindtheexploitsofhackersintrudersdeceivers
AT simonwilliaml artofintrusiontherealstoriesbehindtheexploitsofhackersintrudersdeceivers