|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocm85872819 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
070315s2006 cau o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d BAKER
|d CEF
|d OCLCQ
|d MBB
|d DEBSZ
|d OCLCQ
|d OCLCO
|d CNNAI
|d OCLCF
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d N$T
|d OCLCE
|d YSM
|d EBLCP
|d MERUC
|d YDXCP
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCA
|d AU@
|d OCLCQ
|d OCLCA
|d OCLCQ
|d CNCEN
|d OCLCO
|d FZL
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 85372014
|a 607890672
|a 609522007
|a 772236791
|a 1058254858
|a 1100901992
|a 1351581879
|a 1380772390
|
020 |
|
|
|a 0596527632
|
020 |
|
|
|a 9780596527631
|
020 |
|
|
|a 9780596515508
|q (electronic bk.)
|
020 |
|
|
|a 0596515502
|q (electronic bk.)
|
020 |
|
|
|a 9780596551438
|
020 |
|
|
|a 0596551436
|
024 |
8 |
|
|a 0596527632
|
029 |
1 |
|
|a AU@
|b 000062567472
|
029 |
1 |
|
|a DEBSZ
|b 355372177
|
029 |
1 |
|
|a DEBSZ
|b 396386148
|
029 |
1 |
|
|a AU@
|b 000066232156
|
035 |
|
|
|a (OCoLC)85872819
|z (OCoLC)85372014
|z (OCoLC)607890672
|z (OCoLC)609522007
|z (OCoLC)772236791
|z (OCoLC)1058254858
|z (OCoLC)1100901992
|z (OCoLC)1351581879
|z (OCoLC)1380772390
|
037 |
|
|
|a CL0500000008
|b Safari Books Online
|
042 |
|
|
|a dlr
|
050 |
|
4 |
|a TK5105.59
|b .L63 2006
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8 L816 2006 [ONLINE]
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Lockhart, Andrew.
|
245 |
1 |
0 |
|a Network security hacks /
|c Andrew Lockhart.
|
250 |
|
|
|a 2nd ed.
|
260 |
|
|
|a Sebastopol, Calif. :
|b O'Reilly,
|c 2006.
|
300 |
|
|
|a 1 online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
490 |
1 |
|
|a Hacks series
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
0 |
|g Ch. 1.
|t Unix host security --
|g Ch. 2.
|t Windows host security --
|g Ch. 3.
|t Privacy and anonymity --
|g Ch. 4.
|t Firewalling --
|g Ch. 5.
|t Encrypting and securing services --
|g Ch. 6.
|t Network security --
|g Ch. 7.
|t Wireless security --
|g Ch. 8.
|t Logging --
|g Ch. 9.
|t Monitoring and trending --
|g Ch. 10.
|t Secure tunnels --
|g Ch. 11.
|t Network intrusion detection --
|g Ch. 12.
|t Recovery and response.
|
506 |
|
|
|3 Use copy
|f Restrictions unspecified
|2 star
|5 MiAaHDL
|
520 |
|
|
|a In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well. This second edition of Network Security Hacks offers 12.
|
533 |
|
|
|a Electronic reproduction.
|b [S.l.] :
|c HathiTrust Digital Library,
|d 2010.
|5 MiAaHDL
|
538 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
|u http://purl.oclc.org/DLF/benchrepro0212
|5 MiAaHDL
|
583 |
1 |
|
|a digitized
|c 2010
|h HathiTrust Digital Library
|l committed to preserve
|2 pda
|5 MiAaHDL
|
542 |
|
|
|f Copyright © O'Reilly Media, Incorporated
|g 2006
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Internet
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Internet
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Internet
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Computer security.
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Internet
|x Security measures
|2 fast
|
650 |
|
7 |
|a Betriebssystem
|2 gnd
|
650 |
|
7 |
|a Computersicherheit
|2 gnd
|
650 |
|
7 |
|a Datensicherung
|2 gnd
|
650 |
|
7 |
|a Eindringerkennung
|2 gnd
|
650 |
|
7 |
|a Kommunikationsprotokoll
|2 gnd
|
650 |
|
7 |
|a Rechnernetz
|2 gnd
|
650 |
|
7 |
|a Virtuelles privates Netzwerk
|2 gnd
|
650 |
|
7 |
|a Internet
|2 gnd
|
776 |
0 |
8 |
|i Print version:
|a Lockhart, Andrew.
|t Network security hacks.
|b 2nd ed.
|d Beijing ; Sebastopol, CA : O'Reilly, ©2007
|z 0596527632
|w (DLC) 2007273366
|w (OCoLC)122425883
|
830 |
|
0 |
|a Hacks series.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/0596527632/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Baker & Taylor
|b BKTY
|c 29.99
|d 22.49
|i 0596527632
|n 0006887485
|s active
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL540453
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 415135
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3179759
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7365482
|
994 |
|
|
|a 92
|b IZTAP
|