000 01885nkm a2200421Ia 4500
001 on1013545066
003 OCoLC
005 20180530132845.0
006 m o c
007 cr cna||||||||
007 vz czazuu
008 171130s2017 xx 112 o vleng d
035 _a(OCoLC)1013545066
037 _aCL0500000916
_bSafari Books Online
040 _aDLC
_beng
_cDLC
_dSafari Books Online, LLC
_dAU
049 _aAlfaisal Main Library
050 4 _aQA76.9.A25
100 1 _aRussell, Chad,
_eon-screen presenter.
245 1 0 _aEthical hacking :
_bhacking databases /
_cChad Russell.
246 3 0 _aHacking databases
264 1 _a[Place of publication not identified] :
_bStone River eLearning,
_c2017.
300 _a1 online resource (1 streaming video file (1 hr., 51 min., 6 sec.)) :
_bdigital, sound, color
336 _atwo-dimensional moving image
_btdi
_2rdacontent
337 _acomputer
_bc
_2rdamedia
337 _avideo
_bv
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
511 0 _aPresenter, Chad Russell.
500 _aTitle from resource description page (Safari, viewed November 28, 2017).
520 _a"This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! Each chapter closes with exercises putting your new learned skills into practical use immediately. You will start by understand network anonymity by using tools such as Tor, Tortilla and Proxy Chains."--Resource description page.
650 0 _aComputer security.
650 0 _aHacking.
650 0 _aPenetration testing (Computer security)
655 7 _aElectronic books.
_2local
710 2 _aSafari eBooks.
856 4 0 _uhttp://ezproxy.alfaisal.edu/login?url=http://academic.safaribooksonline.com/?uiCode=sdl&xmlId=100000006A0718
942 _2lcc
_cEBOOKS
994 _aC0
_bUMI
260 _c2017.
999 _c549958
_d549958