Loading…

Network Security Assessment /

There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of systems used by hackers in the wild...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Main Author: McNab, Chris (Chris R.), 1980-
Format: Electronic eBook
Language:Inglés
Published: Sebastopol, CA : O'Reilly Media, Inc., 2004.
Edition:1st ed.
Subjects:
Online Access:Texto completo (Requiere registro previo con correo institucional)
Search Result 1