Network Security Assessment /
There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of systems used by hackers in the wild...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | McNab, Chris (Chris R.), 1980- |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Sebastopol, CA :
O'Reilly Media, Inc.,
2004.
|
Edición: | 1st ed. |
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Ejemplares similares
-
Network security assessment : know your network /
por: McNab, Chris (Chris R.), 1980-
Publicado: (2017) -
Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux /
por: Muniz, Joseph
Publicado: (2013) -
Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux /
por: Muniz, Joseph
Publicado: (2013) -
Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux /
por: Muniz, Joseph
Publicado: (2013) -
Security threat mitigation and response : understanding Cisco security MARS /
por: Tesch, Dale
Publicado: (2006)