|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocm60696315 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
050622s2004 waua ob 001 0 eng d |
040 |
|
|
|a OCL
|b eng
|e pn
|c OCL
|d OCLCQ
|d OCLCG
|d CEF
|d OCLCQ
|d AZU
|d NHM
|d MBB
|d N$T
|d OCLCQ
|d OCLCF
|d OCLCQ
|d E7B
|d YDXCP
|d OCLCQ
|d COO
|d AU@
|d WYU
|d VT2
|d CNCEN
|d UKAHL
|d OKU
|d INARC
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 729550330
|a 748094756
|a 777400786
|a 861533120
|a 1044360955
|a 1056423067
|a 1058082713
|a 1060898041
|a 1062918174
|a 1103273415
|a 1129365490
|a 1202554768
|a 1240537856
|a 1255740001
|
020 |
|
|
|a 9780735635777
|q (electronic bk.)
|
020 |
|
|
|a 0735635773
|q (electronic bk.)
|
020 |
|
|
|z 0735620334
|q (pbk.)
|
020 |
|
|
|z 9780735620339
|
029 |
1 |
|
|a AU@
|b 000071511305
|
029 |
1 |
|
|a HEBIS
|b 291448461
|
029 |
1 |
|
|a NZ1
|b 12403301
|
029 |
1 |
|
|a NZ1
|b 13657028
|
035 |
|
|
|a (OCoLC)60696315
|z (OCoLC)729550330
|z (OCoLC)748094756
|z (OCoLC)777400786
|z (OCoLC)861533120
|z (OCoLC)1044360955
|z (OCoLC)1056423067
|z (OCoLC)1058082713
|z (OCoLC)1060898041
|z (OCoLC)1062918174
|z (OCoLC)1103273415
|z (OCoLC)1129365490
|z (OCoLC)1202554768
|z (OCoLC)1240537856
|z (OCoLC)1255740001
|
050 |
|
4 |
|a TK5105.59
|b .L36 2004
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Lam, Kevin.
|
245 |
1 |
0 |
|a Assessing network security /
|c Kevin Lam, David LeBlanc, Ben Smith.
|
260 |
|
|
|a Redmond, Wash. :
|b Microsoft Press,
|c ©2004.
|
300 |
|
|
|a 1 online resource (xxix, 553 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references (pages 515-526) and index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
0 |
|g pt. I.
|t Planning and performing security assessments --
|g 1.
|t Introduction to performing security assessments --
|g 2.
|t Key principles of security --
|g 3.
|t Using vulnerability scanning to assess network security --
|g 4.
|t Conducting a penetration test --
|g 5.
|t Performing IT security audits --
|g 6.
|t Reporting your findings --
|g 7.
|t Building and maintaining your security assessment skills --
|g pt. II.
|t Penetration testing for nonintrusive attacks --
|g 8.
|t Information reconnaissance --
|g 9.
|t Host discovery using DNS and NetBIOS --
|g 10.
|t Network and host discovery --
|g 11.
|t Port scanning --
|g 12.
|t Obtaining information from a host --
|g 13.
|t War dialing, war driving, and bluetooth attacks --
|g pt. III.
|t Penetration testing for intrusive attacks --
|g 14.
|t Automated vulnerability detection --
|g 15.
|t Password attacks --
|g 16.
|t Denial of service attacks --
|g 17.
|t Application attacks --
|g 18.
|t Database attacks --
|g 19.
|t Network sniffing --
|g 20.
|t Spoofing --
|g 21.
|t Session hijacking --
|g 22.
|t How attackers avoid detection --
|g 23.
|t Attackers using non-network methods to gain access --
|g pt. IV.
|t Security assessment case studies --
|g 24.
|t Web threats --
|g 25.
|t E-mail threats --
|g 26.
|t Domain controller threats --
|g 27.
|t Extranet and VPN threats --
|g pt. V.
|t Appendixes.
|
520 |
|
|
|a Help beat the hackers at their own game! Discover how to take charge of system assets through hands-on vulnerability scanning, penetration testing, and other advanced testing techniques--straight from members of the Microsoft Security Team.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
700 |
1 |
|
|a LeBlanc, David,
|d 1960-
|
700 |
1 |
|
|a Smith, Ben,
|d 1975-
|
776 |
0 |
8 |
|i Print version:
|a Lam, Kevin.
|t Assessing network security.
|d Redmond, Wash. : Microsoft Press, ©2004
|z 0735620334
|w (DLC) 2004049997
|w (OCoLC)55019348
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/0735620334/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26378450
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10762030
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 431705
|
938 |
|
|
|a Internet Archive
|b INAR
|n assessingnetwork0000lamk
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7470893
|
994 |
|
|
|a 92
|b IZTAP
|