Cargando…

Special ops : host and network security for microsoft, unix, and oracle.

A book on internal network security, which uses a two-pronged approach - Tactical and Strategic - to give readers a guide to internal penetration testing. Its content includes the vulnerabilities and exploits, assessment methodologies, host review guides, secure baselines and case studies.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Birkholz, Erik Pace
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol : O'Reilly Media, 2003.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a22000003i 4500
001 EBOOKCENTRAL_ocn191035015
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |||||||||||
008 080121s2003 xx o 000 0 eng d
040 |a YDXCP  |b eng  |e pn  |c YDXCP  |d IDEBK  |d OCLCQ  |d MERUC  |d OCLCQ  |d EBLCP  |d OCLCQ  |d UKDOC  |d OCLCQ  |d ZCU  |d S8J  |d OCLCO  |d OCLCF  |d ICG  |d OCLCQ  |d OCLCO  |d UMR  |d DKC  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 935246405 
020 |a 0080481051 
020 |a 9780080481050 
029 1 |a DEBBG  |b BV044124228 
035 |a (OCoLC)191035015  |z (OCoLC)935246405 
050 4 |a TK 
082 0 4 |a 005.8 
049 |a UAMI 
100 1 |a Birkholz, Erik Pace. 
245 1 0 |a Special ops :  |b host and network security for microsoft, unix, and oracle. 
260 |a Sebastopol :  |b O'Reilly Media,  |c 2003. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a 1931836698.pdf; 1931836698.pdf; Cover; Table of Contents; Foreword; Chapter 1 Assessing Internal Network Security; Chapter 2 Inventory and Exposure of Corporate Assets; Chapter 3 Hunting for High Severity Vulnerabilities (HSV); Chapter 4 Attacking and Defending Windows XP Professional; Chapter 5 Attacking and Defending Windows 2000; Chapter 6 Securing Active Directory; Chapter 7 Securing Exchange and Outlook Web Access; Chapter 8 Attacking and Defending DNS; Chapter 9 Attacking and Defending Microsoft Terminal Services; Chapter 10 Securing IIS; Chapter 11 Hacking Custom Web Applications. 
520 |a A book on internal network security, which uses a two-pronged approach - Tactical and Strategic - to give readers a guide to internal penetration testing. Its content includes the vulnerabilities and exploits, assessment methodologies, host review guides, secure baselines and case studies. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
630 0 0 |a UNIX (Computer file) 
630 0 0 |a Oracle (Computer file) 
630 0 7 |a Oracle (Computer file)  |2 fast 
630 0 7 |a UNIX (Computer file)  |2 fast 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Computer networks  |x Security measures  |2 fast 
776 0 8 |i Print version:  |a Syngress.  |t Special Ops: Host and Network Security for Microsoft Unix and Oracle.  |d : Elsevier Science, ©2014 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=294373  |z Texto completo 
938 |a 123Library  |b 123L  |n 36362 
938 |a EBL - Ebook Library  |b EBLB  |n EBL294373 
938 |a YBP Library Services  |b YANK  |n 2613368 
994 |a 92  |b IZTAP