Registos Bibliográficos associados ao registo de autoridade |
|
Etiqueta de registo: 00230nam 2200025 450 001 1702421 003 http://id.bnportugal.gov.pt/bib/catbnp/1702421 010 ## $a972-722-459-8 021 ## $aPT$b266338/05 100 ## $a20090212d2005 m y0pory0103 ba 101 0# $apor 102 ## $aPT 105 ## $aa j 001yy 106 ## $ar 200 1# $aHackers$etécnicas de defesa e de ataque$fJoão Amado 205 ## $a2ª ed 210 #9 $aLisboa$cFCA,$dD.L. 2005 215 ## $aXII, 244, [4] p.$cil.$d24 cm 675 ## $a004.05(083.1)$vBN$zpor$31309647 675 ## $a004.49(083.1)$vBN$zpor$31257889 700 #1 $91$aAmado,$bJoão$31309544 801 #0 $aPT$bBN$gRPC 900 ## $aBIBNAC$d20130602 966 ## $lBN$mFGMON$sP. 25671 V.$x1 966 ## $lBN$mFGMON$sP. 25671 V.-D$x1
Etiqueta de registo: 00230nam 2200025 450 001 1694730 003 http://id.bnportugal.gov.pt/bib/catbnp/1694730 010 ## $a972-722-459-8 021 ## $aPT$b216072/04 100 ## $a20081027d2004 m y0pory0103 ba 101 0# $apor 102 ## $aPT 105 ## $aa j 001yy 106 ## $ar 200 1# $aHackers$etécnicas de defesa e de ataque$fJoão Amado 210 #9 $aLisboa$cFCA,$dcop. 2004 [D.L. 2007] 215 ## $aXII, 244, [4] p.$cil.$d24 cm 675 ## $a004.05(083.1)$vBN$zpor$31309647 675 ## $a004.49(083.1)$vBN$zpor$31257889 700 #1 $91$aAmado,$bJoão$31309544 801 #0 $aPT$bBN$gRPC 900 ## $aBIBNAC$d20130602 966 ## $lBN$mFGMON$sP. 25058 V.$x1 966 ## $lBN$mFGMON$sP. 25058 V.-D $x1
Etiqueta de registo: 00000nam 2200025 450 001 2027391 003 http://id.bnportugal.gov.pt/bib/catbnp/2027391 010 ## $a978-972-8914-96-7 021 ## $aPT$b453897/19 100 ## $a20190808d2019 m y0pory01030103ba 101 1# $aspa$cpor 102 ## $aPT 105 ## $aa z 000yy 106 ## $ar 200 1# $aAnálisis contenido soportado por software$fAntónio Pedro Costa, João Amado$gtrad. Ricardo Luengo González, José Luis Carvalho 205 ## $a1ª ed 210 #9 $aOliveira de Azeméis$cLudomedia,$d2019 215 ## $a60 p.$cil.$d24 cm 675 ## $a004.42$vBN$zpor$31042344 675 ## $a004.82$vBN$zpor$31760022 700 #1 $aCosta,$bAntonio Pedro$31714973 701 #1 $91$aAmado,$bJoão$4070$31309544 702 #1 $a Luengo González,$bRicardo$4730$31535442 702 #1 $92$aCarvalho,$bJosé Luis$4730$31760759 801 #0 $aPT$bBN$gRPC 856 41 $uhttp://rnod.bnportugal.gov.pt/ImagesBN/winlibimg.aspx?skey=&doc=2027391&img=128709&save=true 900 ## $aBIBNAC$d20190823 966 ## $lBN$mFGMON$sP. 53898 V.$x1 966 ## $lBN$mFGMON$sP. 53898 V.-D$x1
Etiqueta de registo: 00230nam 2200025 450 001 1669617 003 http://id.bnportugal.gov.pt/bib/catbnp/1669617 010 ## $a978-972-722-540-8 010 ## $a972-722-540-3 021 ## $aPT$b243169/06 100 ## $a20071022d2006 m y0pory0103 ba 101 0# $apor 102 ## $aPT 105 ## $aa j 000yy 106 ## $ar 200 1# $aHackers$etécnicas de defesa e de ataque$fJoão Amado 205 ## $a3ª ed., actualiz. e aument 210 #9 $aLisboa$cFCA,$d2006 215 ## $aXV, 274, [4] p.$cil.$d24 cm 675 ## $a004.05(083.1)$vBN$zpor$31309647 675 ## $a004.49(083.1)$vBN$zpor$31257889 700 #1 $91$aAmado,$bJoão$31309544 801 #0 $aPT$bBN$gRPC 900 ## $aBIBNAC$d20130602 966 ## $lBN$mFGMON$pRolo & Filhos II, SA - Digital XXI$sP. 23377 V.$x1 966 ## $lBN$mFGMON$pRolo & Filhos II, SA - Digital XXI$sP. 23377 V.-D $x1
|
|
|