IUKL Library
Normal view MARC view ISBD view

The software vulnerability guide Herbert H. Thompson, Scott G. Chase.

By: Thompson, Herbert H.
Contributor(s): Chase, Scott G | ebrary, Inc.
Material type: materialTypeLabelBookPublisher: Hingham, Mass. : Charles River Media, 2005Edition: 1st ed.Description: xiii, 354 p. : ill. ; 23 cm. +.Subject(s): Computer security | Computer software -- Development | Computer networks -- Security measuresOnline resources: An electronic book accessible through the World Wide Web; click to view
List(s) this item appears in: 20160628 MQA BMM (Computer Security) | 20170929 MQA FCMIT BIT in Multimedia
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Collection Call number Copy number Status Date due Item holds
Book (red spot) Book (red spot) IUKL Library
Open shelves
Purchase QA76.9 Tho (Browse shelf) 1 Not For Loan
Total holds: 0

Includes bibliographical references and index.

There are no comments for this item.

Log in to your account to post a comment.
The Library's homepage is at http://library.iukl.edu.my/.