01414nam a2200385Ia 4500001001200000003000800012006001900020007001500039008004100054010001700095020002300112020002600135040002100161035002100182050002800203082001400231100003200245245008700277246001800364246003700382260004400419300002400463500002000487533015200507650003200659650003000691650003100721650005100752650002600803655002900829710001700858730001000875856012600885999001701011ebr10248937CaPaEBRm u cr cn|||||||||080422s2008 inua s 001 0deng d z 2008018567 z0470294191 (cloth) z9780470294192 (cloth) aCaPaEBRcCaPaEBR a(OCoLC)64676187514aQA76.9.A25bG643 2008eb04a005.82221 aGoldstein, Emmanuel,d1959-14aThe best of 2600h[electronic resource] :ba hacker odyssey /cEmmanuel Goldstein.3 aBest of 2,6003 aBest of two thousand six hundred aIndianapolis, IN :bWiley Pub.,cc2008. axvi, 871 p. :bill. aIncludes index. aElectronic reproduction.bPalo Alto, Calif. :cebrary,d2009.nAvailable via World Wide Web.nAccess may be limited to ebrary affiliated libraries. 0aComputer securityxHistory. 0aComputer crimesxHistory. 0aComputer hackersxHistory. 0aTelecommunicationxSecurity measuresxHistory. 0aWiretappingxHistory. 7aElectronic books.2local2 aebrary, Inc.0 a2600.40uhttp://site.ebrary.com/lib/rucke/Doc?id=10248937zAn electronic book accessible through the World Wide Web; click to view c34983d34983