Cargando…

Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Skoudis, Ed
Otros Autores: Liston, Tom
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Upper Saddle River, N.J. : Prentice Hall Professional Technical Reference, 2005.
Edición:2nd ed.
Colección:Radia Perlman series in computer networking and security.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn123904762
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 070501s2005 nju ob 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d CEF  |d OCLCQ  |d DEBSZ  |d TXM  |d OCLCQ  |d OCLCF  |d OCLCQ  |d OCLCE  |d OCLCQ  |d YDX  |d AU@  |d OCLCQ  |d UKAHL  |d OCLCQ  |d OCLCO 
019 |a 636337105  |a 1006471237 
020 |a 9780131481046 
020 |a 0131481045 
020 |a 9780132704533 
020 |a 0132704536 
029 1 |a DEBSZ  |b 35539636X 
029 1 |a HEBIS  |b 29146954X 
035 |a (OCoLC)123904762  |z (OCoLC)636337105  |z (OCoLC)1006471237 
037 |a CL0500000009  |b Safari Books Online 
050 4 |a TK5105.59  |b .S57 2005 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Skoudis, Ed. 
245 1 0 |a Counter hack reloaded :  |b a step-by-step guide to computer attacks and effective defenses /  |c by Ed Skoudis, Tom Liston. 
250 |a 2nd ed. 
260 |a Upper Saddle River, N.J. :  |b Prentice Hall Professional Technical Reference,  |c 2005. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Radia Perlman series in computer networking and security 
504 |a Includes bibliographical references and index. 
505 0 |a Introduction -- Networking overview: pretty much everything you need to know about networking to follow the rest of this book -- Linux and UNIX overview: pretty much everything you need to know about Linux and UNIX to follow the rest of this book -- Windows NT/2000/XP/2003 overview: pretty much everything you need to know about windows to follow the rest of this book -- Phase 1: reconnaissance -- Phase 2: scanning -- Phase 3: gaining access using application and operating system attacks -- Phase 3: gaining access using network attacks -- Phase 3: denial-of-service attacks -- Phase 4: maintaining access: trojans, backdoors, and rootkits ... Oh my! -- Phase 5: covering tracks and hiding -- Putting it all together: anatomy of an attack -- The future, references, and conclusions. 
588 0 |a Print version record. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Data protection. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Protection de l'information (Informatique) 
650 7 |a Computer networks  |x Security measures.  |2 blmlsh 
650 7 |a Data protection.  |2 blmlsh 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
700 1 |a Liston, Tom. 
776 0 8 |i Print version:  |a Skoudis, Ed.  |t Counter hack reloaded.  |b 2nd ed.  |d Upper Saddle River, NJ : Prentice Hall Professional Technical Reference, ©2006  |w (DLC) 2005027164  |w (OCoLC)61694770 
830 0 |a Radia Perlman series in computer networking and security. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780131481046/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH25034765 
938 |a YBP Library Services  |b YANK  |n 14883620 
994 |a 92  |b IZTAP