|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn123904762 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
070501s2005 nju ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d CEF
|d OCLCQ
|d DEBSZ
|d TXM
|d OCLCQ
|d OCLCF
|d OCLCQ
|d OCLCE
|d OCLCQ
|d YDX
|d AU@
|d OCLCQ
|d UKAHL
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 636337105
|a 1006471237
|
020 |
|
|
|a 9780131481046
|
020 |
|
|
|a 0131481045
|
020 |
|
|
|a 9780132704533
|
020 |
|
|
|a 0132704536
|
029 |
1 |
|
|a DEBSZ
|b 35539636X
|
029 |
1 |
|
|a HEBIS
|b 29146954X
|
035 |
|
|
|a (OCoLC)123904762
|z (OCoLC)636337105
|z (OCoLC)1006471237
|
037 |
|
|
|a CL0500000009
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.59
|b .S57 2005
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Skoudis, Ed.
|
245 |
1 |
0 |
|a Counter hack reloaded :
|b a step-by-step guide to computer attacks and effective defenses /
|c by Ed Skoudis, Tom Liston.
|
250 |
|
|
|a 2nd ed.
|
260 |
|
|
|a Upper Saddle River, N.J. :
|b Prentice Hall Professional Technical Reference,
|c 2005.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Radia Perlman series in computer networking and security
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Introduction -- Networking overview: pretty much everything you need to know about networking to follow the rest of this book -- Linux and UNIX overview: pretty much everything you need to know about Linux and UNIX to follow the rest of this book -- Windows NT/2000/XP/2003 overview: pretty much everything you need to know about windows to follow the rest of this book -- Phase 1: reconnaissance -- Phase 2: scanning -- Phase 3: gaining access using application and operating system attacks -- Phase 3: gaining access using network attacks -- Phase 3: denial-of-service attacks -- Phase 4: maintaining access: trojans, backdoors, and rootkits ... Oh my! -- Phase 5: covering tracks and hiding -- Putting it all together: anatomy of an attack -- The future, references, and conclusions.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Data protection.
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Data protection.
|2 fast
|0 (OCoLC)fst00887958
|
700 |
1 |
|
|a Liston, Tom.
|
776 |
0 |
8 |
|i Print version:
|a Skoudis, Ed.
|t Counter hack reloaded.
|b 2nd ed.
|d Upper Saddle River, NJ : Prentice Hall Professional Technical Reference, ©2006
|w (DLC) 2005027164
|w (OCoLC)61694770
|
830 |
|
0 |
|a Radia Perlman series in computer networking and security.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780131481046/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH25034765
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14883620
|
994 |
|
|
|a 92
|b IZTAP
|