{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BA70230519.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BA70230519#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BA70230519.json"},"dc:title":[{"@value":"Exploiting software : how to break code"}],"dc:creator":"Greg Hoglund, Gary McGraw ; [foreword by Aviel D. Rubin]","dc:publisher":[{"@value":"Addison-Wesley"}],"dcterms:extent":"xxxv, 471 p.","cinii:size":"24 cm","dc:language":"eng","dc:date":"2004","cinii:ncid":"BA70230519","cinii:ownerCount":"8","foaf:maker":[{"@id":"https://ci.nii.ac.jp/author/DA15262827#entity","@type":"foaf:Person","foaf:name":[{"@value":"Hoglund, Greg"}]},{"@id":"https://ci.nii.ac.jp/author/DA11030604#entity","@type":"foaf:Person","foaf:name":[{"@value":"McGraw, Gary"}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA001889","@type":"foaf:Organization","foaf:name":"東京学芸大学 附属図書館","rdfs:seeAlso":{"@id":"https://library.u-gakugei.ac.jp/mylimedio/search/search.do?target=local&mode=comp&annex=all&ncid=BA70230519"}},{"@id":"https://ci.nii.ac.jp/library/FA001991","@type":"foaf:Organization","foaf:name":"電気通信大学 附属図書館","rdfs:seeAlso":{"@id":"https://www.lib.uec.ac.jp/mylimedio/search/search.do?mode=comp&taget=local&ncid=BA70230519"}},{"@id":"https://ci.nii.ac.jp/library/FA001991","@type":"foaf:Organization","foaf:name":"電気通信大学 附属図書館","rdfs:seeAlso":{"@id":"https://www.lib.uec.ac.jp/mylimedio/search/search.do?mode=comp&taget=local&ncid=BA70230519"}},{"@id":"https://ci.nii.ac.jp/library/FA022164","@type":"foaf:Organization","foaf:name":"兵庫県立大学 神戸情報科学学術情報館","rdfs:seeAlso":{"@id":"https://lib.laic.u-hyogo.ac.jp/opac/search?target=local&searchmode=complex&autoDetail=true&s_ncid=BA70230519"}},{"@id":"https://ci.nii.ac.jp/library/FA006678","@type":"foaf:Organization","foaf:name":"明治大学 図書館","rdfs:seeAlso":{"@id":"https://opac2018.lib.meiji.ac.jp/webopac/ufirdi.do?ufi_target=ctlsrh&ncid=BA70230519"}},{"@id":"https://ci.nii.ac.jp/library/FA007841","@type":"foaf:Organization","foaf:name":"大阪工業大学 図書館","rdfs:seeAlso":{"@id":"https:/opac.lib.oit.ac.jp/iwjs0021opc/ctlsrh.do?ncid=BA70230519"}},{"@id":"https://ci.nii.ac.jp/library/FA016580","@type":"foaf:Organization","foaf:name":"豊田工業高等専門学校 図書館","rdfs:seeAlso":{"@id":"https://libopac-c.kosen-k.go.jp/webopac25/ctlsrh.do?ncid=BA70230519"}},{"@id":"https://ci.nii.ac.jp/library/FA017958","@type":"foaf:Organization","foaf:name":"岩手県立大学 メディアセンター","rdfs:seeAlso":{"@id":"http://libipu.iwate-pu.ac.jp/mylimedio/search/search.do?target=local&mode=comp&category-mgz=1&category-book=1&annex=all&ncid=BA70230519"}}],"bibo:lccn":["2003025556"],"rdfs:seeAlso":[{"@id":"https://lccn.loc.gov/2003025556"}],"prism:publicationDate":["c2004"],"cinii:note":["Includes bibliographical references (p. 449-451) and index"],"dc:subject":["LCC:QA76.9.A25","DC22:005.8"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+security","dc:title":"Computer security"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+software+--+Testing","dc:title":"Computer software -- Testing"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+hackers","dc:title":"Computer hackers"}],"dcterms:hasPart":[{"@id":"urn:isbn:0201786958"}]}]}