|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocm75958853 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
061113s2007 nju ob 001 0 eng d |
010 |
|
|
|a 2006932690
|
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d YDXCP
|d OCLCQ
|d TEFOD
|d IDEBK
|d OCLCQ
|d UMI
|d TXJ
|d CEF
|d C6I
|d NHM
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d OCLCO
|d OCLCF
|d OCLCQ
|d UKDOC
|d OCLCA
|d OCLCQ
|d MERUC
|d OCLCQ
|d OCL
|d OCLCQ
|d TEFOD
|d EBLCP
|d OCLCQ
|d OCLCA
|d OCLCQ
|d UAB
|d RDF
|d OCLCQ
|d AU@
|d WYU
|d VT2
|d OCLCO
|d OCLCQ
|
015 |
|
|
|a GBA668080
|2 bnb
|
016 |
7 |
|
|a 013526985
|2 Uk
|
019 |
|
|
|a 77573632
|a 219607826
|a 437173715
|a 935261418
|a 1044298968
|a 1056352229
|a 1058310790
|a 1060792748
|a 1062885833
|a 1103276053
|a 1129361043
|a 1152980705
|a 1240530943
|
020 |
|
|
|a 0470113073
|q (electronic bk.)
|
020 |
|
|
|a 9780470113073
|q (electronic bk.)
|
020 |
|
|
|a 9780470052358
|
020 |
|
|
|a 047005235X
|
029 |
1 |
|
|a AU@
|b 000044593735
|
029 |
1 |
|
|a AU@
|b 000048761975
|
029 |
1 |
|
|a DEBSZ
|b 355410648
|
029 |
1 |
|
|a DEBSZ
|b 396098436
|
029 |
1 |
|
|a HEBIS
|b 291483143
|
029 |
1 |
|
|a NZ1
|b 11777671
|
029 |
1 |
|
|a YDXCP
|b 2492727
|
029 |
1 |
|
|a AU@
|b 000062342037
|
035 |
|
|
|a (OCoLC)75958853
|z (OCoLC)77573632
|z (OCoLC)219607826
|z (OCoLC)437173715
|z (OCoLC)935261418
|z (OCoLC)1044298968
|z (OCoLC)1056352229
|z (OCoLC)1058310790
|z (OCoLC)1060792748
|z (OCoLC)1062885833
|z (OCoLC)1103276053
|z (OCoLC)1129361043
|z (OCoLC)1152980705
|z (OCoLC)1240530943
|
037 |
|
|
|b OverDrive, Inc.
|n http://www.overdrive.com
|
037 |
|
|
|a 2AFBBA2F-ABAB-4861-B532-689C58041C76
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.9.A25
|b B42 2007eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Beaver, Kevin.
|
245 |
1 |
0 |
|a Hacking for dummies /
|c by Kevin Beaver ; foreword by Stuart McClure.
|
250 |
|
|
|a 2nd ed.
|
260 |
|
|
|a Hoboken, N.J. :
|b Wiley Pub.,
|c ©2007.
|
300 |
|
|
|a 1 online resource (1 volume).
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a --For dummies
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Ch. 1. Introduction to ethical hacking -- Ch. 2. Cracking the hacker mindset -- Ch. 3. Developing your ethical hacking plan -- Ch. 4. Hacking methodology -- Ch. 5. Social engineering -- Ch. 6. Physical security -- Ch. 7. Passwords -- Ch. 8. War dialing -- Ch. 9. Network infrastructure -- Ch. 10. Wireless LANs -- Ch. 11. Windows -- Ch. 12. Linux -- Ch. 13. Novell NetWare -- Ch. 14. Messaging systems -- Ch. 15. Web applications and databases -- Ch. 16. Reporting your results -- Ch. 17. Plugging security holes -- Ch. 18. Managing security changes -- Ch. 19. Ten tips for getting upper management buy-in -- Ch. 20. Ten deadly mistakes.
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a Shows network administrators and security testers how to enter the mindset of a malicious hacker and perform penetration testing on their own networks Thoroughly updated with more than 30 percent new content, including coverage of Windows XP SP2 and Vista, a rundown of new security threats, expanded discussions of rootkits and denial of service (DoS) exploits, new chapters on file and database vulnerabilities and Google hacks, and guidance on new hacker tools such as Metaspoilt Topics covered include developing an ethical hacking plan, counteracting typical hack attacks, reporting vulnerabili.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Hackers.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Pirates informatiques.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security.
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Computer hackers.
|2 blmlsh
|
650 |
|
7 |
|a Hackers.
|2 fast
|0 (OCoLC)fst00872150
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Engineering & Applied Sciences.
|2 hilcc
|
650 |
|
7 |
|a Computer Science.
|2 hilcc
|
776 |
0 |
8 |
|i Print version:
|a Beaver, Kevin.
|t Hacking for dummies.
|b 2nd ed.
|d Hoboken, N.J. : Wiley Pub., ©2007
|z 047005235X
|w (OCoLC)70881775
|
830 |
|
0 |
|a --For dummies.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780470052358/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2492727
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 171921
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL274018
|
938 |
|
|
|a 123Library
|b 123L
|n 51132
|
938 |
|
|
|a Internet Archive
|b INAR
|n hackingfordummie0000beav_v4q6
|
994 |
|
|
|a 92
|b IZTAP
|