Cargando…

Network Security Assessment /

There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of systems used by hackers in the wild...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: McNab, Chris (Chris R.), 1980-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, CA : O'Reilly Media, Inc., 2004.
Edición:1st ed.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Descripción
Sumario:There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of systems used by hackers in the wild is a formidable task, and scrambling to patch each potential vulnerability or address each new attack one-by-one is a bit like emptying the Atlantic with paper cup. If you're a network administrator, the pressure is on you to defend your systems from attack. But short of devoting your life to becomin.
Notas:Includes index.
Descripción Física:1 online resource (xxi, 373 pages) : illustrations
Bibliografía:Includes bibliographical references (pages 354-355) and index.
ISBN:9780596520809
0596520808
9780596552558
0596552556