|
|
|
|
| LEADER |
00000cam a2200000 i 4500 |
| 001 |
94467 |
| 003 |
CZ-ZlUTB |
| 005 |
20200210221203.0 |
| 007 |
ta |
| 008 |
150824s2015 xxua e f 000 0 eng |
| 952 |
|
|
|0 0
|1 0
|4 0
|6 004KIMP
|7 0
|8 BOOK
|9 153043
|a UTBUH
|b UTBUH
|c 032
|d 2020-01-07
|l 1
|m 5
|o 004/KIM,P.
|p 420010182024
|q 2026-09-30
|r 2020-01-15 00:00:00
|s 2020-01-15
|v 550.00
|w 2020-01-07
|x N: nákup;
|y 08
|
| 999 |
|
|
|c 94467
|d 94467
|
| 020 |
|
|
|a 9781512214567
|q (brožováno) :
|
| 040 |
|
|
|a ABE031
|b cze
|d ZLD002
|e rda
|
| 072 |
|
7 |
|a 004
|x Počítačová věda. Výpočetní technika. Informační technologie
|2 Konspekt
|9 23
|
| 080 |
|
|
|a 004.056.53
|2 MRF
|
| 080 |
|
|
|a (035)
|2 MRF
|
| 100 |
1 |
|
|a Kim, Peter
|7 ola2015886691
|4 aut
|
| 245 |
1 |
4 |
|a The hacker playbook 2 :
|b practical guide to penetration testing /
|c Peter Kim
|
| 264 |
|
1 |
|a North Charleston :
|b Secure Planet LLC,
|c [2015]
|
| 264 |
|
4 |
|c ©2015
|
| 300 |
|
|
|a xiv, 339 stran :
|b ilustrace ;
|c 26 cm
|
| 336 |
|
|
|a text
|b txt
|2 rdacontent
|
| 337 |
|
|
|a bez média
|b n
|2 rdamedia
|
| 338 |
|
|
|a svazek
|b nc
|2 rdacarrier
|
| 504 |
|
|
|a Obsahuje bibliografii a rejstřík
|
| 650 |
0 |
7 |
|a penetrační testy (počítačová bezpečnost)
|7 ph888574
|2 czenas
|
| 650 |
0 |
9 |
|a penetration tests (computer security)
|2 eczenas
|
| 655 |
|
7 |
|a příručky
|7 fd133209
|2 czenas
|
| 655 |
|
9 |
|a handbooks and manuals
|2 eczenas
|
| 910 |
|
|
|a ZLD002
|
| 942 |
|
|
|2 udc
|
| 992 |
|
|
|a BK
|b SK
|