<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>01012pamaa2200265   4500</leader>
  <controlfield tag="001">0000052867</controlfield>
  <controlfield tag="005">20140821090000.0</controlfield>
  <controlfield tag="008">140819s2013</controlfield>
  <datafield tag="020" ind1="0" ind2="0">
   <subfield code="a">9780124166004 (electronic bk) </subfield>
  </datafield>
  <datafield tag="090" ind1="0" ind2="0">
   <subfield code="a">TK5105.59 </subfield>
   <subfield code="b">PAU 2013eb</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2="0">
   <subfield code="a">Pauli </subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="4">
   <subfield code="a">The basics of web hacking [</subfield>
   <subfield code="m">electronic resource] : </subfield>
   <subfield code="b">tools and techniques to attack the Web  </subfield>
   <subfield code="c">Josh Pauli.</subfield>
  </datafield>
  <datafield tag="260" ind1="0" ind2="0">
   <subfield code="a">Waltham, MA: </subfield>
   <subfield code="b">Butterworth-Heinemann, </subfield>
   <subfield code="c">2013.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">1 online resource (xiii, 145 p): </subfield>
   <subfield code="b">ill, 24 cm.</subfield>
  </datafield>
  <datafield tag="440" ind1="0" ind2="4">
   <subfield code="a">The basics</subfield>
  </datafield>
  <datafield tag="501" ind1="0" ind2="0">
   <subfield code="a">FOSTEM</subfield>
  </datafield>
  <datafield tag="504" ind1="0" ind2="0">
   <subfield code="a">Includes bibliographical references and index</subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Web sites -- </subfield>
   <subfield code="x">Security measures </subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Computer networks -- </subfield>
   <subfield code="x">Security measures </subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Penetration testing (Computer security) </subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Computer crimes -- </subfield>
   <subfield code="x">Prevention </subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Web applications -- </subfield>
   <subfield code="x">Security measures </subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Hackers </subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="0">
   <subfield code="u">http://www.sciencedirect.com/science/book/9780124166004</subfield>
  </datafield>
  <datafield tag="901" ind1=" " ind2=" ">
   <subfield code="u">http://www.sciencedirect.com/science/book/9780124166004</subfield>
  </datafield>
 </record>
</collection>
