|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocm55154665 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
040517s2004 caua ob 001 0 eng d |
040 |
|
|
|a OCL
|b eng
|e pn
|c OCL
|d OCLCQ
|d UMC
|d CEF
|d HVC
|d OCLCQ
|d OCLCE
|d CUSER
|d CRU
|d VLB
|d AZU
|d NHM
|d MBB
|d N$T
|d EBLCP
|d MHW
|d OCLCQ
|d OCLCO
|d DEBSZ
|d OCLCO
|d OCLCQ
|d IDEBK
|d OCLCO
|d OCLCQ
|d E7B
|d YDXCP
|d OCLCQ
|d COO
|d OCLCO
|d FEM
|d OCLCQ
|d UIU
|d OCLCF
|d WYU
|d VT2
|d OCLCQ
|d CNCEN
|d RDF
|d UKAHL
|d INARC
|d UKBTH
|d TOH
|d OCLCO
|d TAC
|d OCLCO
|d FZL
|d OCLCQ
|
015 |
|
|
|a GBA600058
|2 bnb
|
016 |
7 |
|
|a 012963733
|2 Uk
|
019 |
|
|
|a 326569510
|a 607066200
|a 609963106
|a 729549207
|a 748093995
|a 759514883
|a 772458783
|a 809686559
|a 861531751
|a 968043449
|a 969027095
|a 1019733029
|a 1056354260
|a 1060837242
|a 1064067269
|a 1075564982
|a 1083174359
|a 1100828431
|a 1103267902
|a 1104434773
|a 1105797243
|a 1129362847
|a 1150800213
|a 1159612613
|a 1202551193
|a 1224593164
|a 1240508654
|a 1302701949
|a 1351597270
|a 1355685590
|a 1380770203
|
020 |
|
|
|a 9780596520809
|q (electronic bk.)
|
020 |
|
|
|a 0596520808
|q (electronic bk.)
|
020 |
|
|
|a 9780596552558
|
020 |
|
|
|a 0596552556
|
020 |
|
|
|z 059600611X
|
020 |
|
|
|z 9780596006112
|
024 |
8 |
|
|a 059600611X
|
029 |
1 |
|
|a AU@
|b 000055606067
|
029 |
1 |
|
|a AU@
|b 000066232159
|
029 |
1 |
|
|a AU@
|b 000066533268
|
029 |
1 |
|
|a AU@
|b 000067113053
|
029 |
1 |
|
|a DEBSZ
|b 396387675
|
029 |
1 |
|
|a HEBIS
|b 291423876
|
035 |
|
|
|a (OCoLC)55154665
|z (OCoLC)326569510
|z (OCoLC)607066200
|z (OCoLC)609963106
|z (OCoLC)729549207
|z (OCoLC)748093995
|z (OCoLC)759514883
|z (OCoLC)772458783
|z (OCoLC)809686559
|z (OCoLC)861531751
|z (OCoLC)968043449
|z (OCoLC)969027095
|z (OCoLC)1019733029
|z (OCoLC)1056354260
|z (OCoLC)1060837242
|z (OCoLC)1064067269
|z (OCoLC)1075564982
|z (OCoLC)1083174359
|z (OCoLC)1100828431
|z (OCoLC)1103267902
|z (OCoLC)1104434773
|z (OCoLC)1105797243
|z (OCoLC)1129362847
|z (OCoLC)1150800213
|z (OCoLC)1159612613
|z (OCoLC)1202551193
|z (OCoLC)1224593164
|z (OCoLC)1240508654
|z (OCoLC)1302701949
|z (OCoLC)1351597270
|z (OCoLC)1355685590
|z (OCoLC)1380770203
|
037 |
|
|
|a 7346535501993619052
|b TotalBoox
|f Ebook only
|n www.totalboox.com
|
042 |
|
|
|a dlr
|
050 |
|
4 |
|a QA76.9.A25
|b M4355 2004
|
060 |
|
4 |
|a QA 76.76 O63
|b M36 2004
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a McNab, Chris
|q (Chris R.),
|d 1980-
|
245 |
1 |
0 |
|a Network Security Assessment /
|c Chris McNab.
|
246 |
3 |
|
|a Network security: assessment of information systems
|
246 |
3 |
|
|a Network security and assessment
|
250 |
|
|
|a 1st ed.
|
260 |
|
|
|a Sebastopol, CA :
|b O'Reilly Media, Inc.,
|c 2004.
|
300 |
|
|
|a 1 online resource (xxi, 373 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references (pages 354-355) and index.
|
505 |
0 |
0 |
|g 1.
|t Network security assessment --
|g 2.
|t tools required --
|g 3.
|t Internet host and network enumeration --
|g 4.
|t IP network scanning --
|g 5.
|t Assessing remote information services --
|g 6.
|t Assessing web services --
|g 7.
|t Assessing remote maintenance services --
|g 8.
|t Assessing FTP and database services --
|g 9.
|t Assessing Windows networking services --
|g 10.
|t Assessing email services --
|g 11.
|t Assessing IP VPN services --
|g 12.
|t Assessing Unix RPC services --
|g 13.
|t Application-level risks --
|g 14.
|t Example assessment methodology --
|g A.
|t TCP, UPD ports, and ICMP message types.
|
520 |
|
|
|a There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of systems used by hackers in the wild is a formidable task, and scrambling to patch each potential vulnerability or address each new attack one-by-one is a bit like emptying the Atlantic with paper cup. If you're a network administrator, the pressure is on you to defend your systems from attack. But short of devoting your life to becomin.
|
506 |
|
|
|3 Use copy
|f Restrictions unspecified
|2 star
|5 MiAaHDL
|
533 |
|
|
|a Electronic reproduction.
|b [Place of publication not identified] :
|c HathiTrust Digital Library,
|d 2010.
|5 MiAaHDL
|
538 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
|u http://purl.oclc.org/DLF/benchrepro0212
|5 MiAaHDL
|
583 |
1 |
|
|a digitized
|c 2010
|h HathiTrust Digital Library
|l committed to preserve
|2 pda
|5 MiAaHDL
|
542 |
|
|
|f Copyright © O'Reilly Media, Incorporated
|g 2004
|
542 |
|
|
|f Copyright © O'Reilly Media, Inc.
|g 2004
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computers
|x Access control
|x Evaluation.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|x Evaluation.
|
650 |
|
6 |
|a Ordinateurs
|x Accès
|x Contrôle
|x Évaluation.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures
|x Évaluation.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computers
|x Access control
|x Evaluation.
|2 fast
|0 (OCoLC)fst01766494
|
653 |
|
|
|a Security
|
776 |
0 |
8 |
|i Print version:
|a McNab, Chris (Chris R.), 1980-
|t Network Security Assessment.
|b 1st ed.
|d Sebastopol, CA : O'Reilly Media, Inc., 2004
|z 059600611X
|w (OCoLC)55001981
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/059600611X/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH29297872
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL540706
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10758936
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 415201
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis28429854
|
938 |
|
|
|a Internet Archive
|b INAR
|n networksecuritya0000mcna
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3179832
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7365541
|
994 |
|
|
|a 92
|b IZTAP
|