|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn177673403 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr nn|---||||| |
008 |
040127s2004 ch a ob 001 0 eng d |
040 |
|
|
|a VYR
|b eng
|e pn
|c PUL
|d UMC
|d OCLCE
|d OCLCQ
|d AZU
|d NHM
|d MBB
|d N$T
|d EBLCP
|d TXM
|d OCLCQ
|d OCLCO
|d OCLCF
|d DEBSZ
|d OCLCQ
|d YDXCP
|d E7B
|d OCLCQ
|d COO
|d UHL
|d OCLCQ
|d UK7LJ
|d UAB
|d OCLCO
|d OCLCQ
|
016 |
7 |
|
|a 0596005458
|2 Uk
|
019 |
|
|
|a 603991447
|a 648026215
|a 729549193
|a 748093925
|a 759520466
|a 770008299
|a 861530936
|a 1113689138
|a 1156176423
|a 1179124267
|
020 |
|
|
|a 0596005458
|
020 |
|
|
|a 9780596005450
|
020 |
|
|
|a 9780596517229
|q (electronic bk.)
|
020 |
|
|
|a 059651722X
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000055618004
|
029 |
1 |
|
|a DEBSZ
|b 396386660
|
029 |
1 |
|
|a HEBIS
|b 291423728
|
035 |
|
|
|a (OCoLC)177673403
|z (OCoLC)603991447
|z (OCoLC)648026215
|z (OCoLC)729549193
|z (OCoLC)748093925
|z (OCoLC)759520466
|z (OCoLC)770008299
|z (OCoLC)861530936
|z (OCoLC)1113689138
|z (OCoLC)1156176423
|z (OCoLC)1179124267
|
042 |
|
|
|a dlr
|
050 |
|
4 |
|a TK5105.59
|b .P44985 2004
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
084 |
|
|
|a 54.61
|2 bcl
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Peikari, Cyrus.
|
245 |
1 |
0 |
|a Security warrior /
|c Cyrus Peikari and Anton Chuvakin.
|
250 |
|
|
|a 1st ed.
|
260 |
|
|
|a Beijing ;
|a Sebastopol, CA :
|b O'Reilly & Associates,
|c ©2004.
|
300 |
|
|
|a 1 online resource (xvii, 531) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
550 |
|
|
|a Digitized and made available by: CRC Press.
|
505 |
0 |
0 |
|g pt. I.
|t Software Cracking --
|g 1.
|t Assembly Language --
|g 2.
|t Windows Reverse Engineering --
|g 3.
|t Linux Reverse Engineering --
|g 4.
|t Windows CE Reverse Engineering --
|g 5.
|t Overflow Attacks --
|g pt. II.
|t Network Stalking --
|g 6.
|t TCP/IP Analysis --
|g 7.
|t Social Engineering --
|g 8.
|t Reconnaissance --
|g 9.
|t OS Fingerprinting --
|g 10.
|t Hiding the Tracks --
|g pt. III.
|t Platform Attacks --
|g 11.
|t Unix Defense --
|g 12.
|t Unix Attacks --
|g 13.
|t Windows Client Attacks --
|g 14.
|t Windows Server Attacks --
|g 15.
|t SOAP XML Web Services Security --
|g 16.
|t SQL Injection --
|g 17.
|t Wireless Security --
|g pt. IV.
|t Advanced Defense --
|g 18.
|t Audit Trail Analysis --
|g 19.
|t Intrusion Detection Systems --
|g 20.
|t Honeypots --
|g 21.
|t Incident Response --
|g 22.
|t Forensics and Antiforensics --
|g pt. V.
|t Appendix --
|g App.
|t Useful SoftICE Commands and Breakpoints.
|
506 |
|
|
|3 Use copy
|f Restrictions unspecified
|2 star
|5 MiAaHDL
|
533 |
|
|
|a Electronic reproduction.
|b [Place of publication not identified] :
|c HathiTrust Digital Library,
|d 2010.
|5 MiAaHDL
|
538 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
|u http://purl.oclc.org/DLF/benchrepro0212
|5 MiAaHDL
|
583 |
1 |
|
|a digitized
|c 2010
|h HathiTrust Digital Library
|l committed to preserve
|2 pda
|5 MiAaHDL
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
1 |
7 |
|a Computerbeveiliging.
|2 gtt
|
650 |
1 |
7 |
|a Preventie.
|2 gtt
|
650 |
1 |
7 |
|a Opsporing.
|2 gtt
|
650 |
|
7 |
|a Réseaux d'ordinateurs
|x Mesures de sûreté.
|2 ram
|
700 |
1 |
|
|a Chuvakin, Anton.
|
776 |
0 |
8 |
|i Print version:
|a Peikari, Cyrus.
|t Security warrior.
|b 1st ed.
|d Beijing ; Sebastopol, CA : O'Reilly & Associates, ©2004
|w (DLC) 2004300981
|w (OCoLC)54089960
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/0596005458/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL540546
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10758640
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 415235
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7353901
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3179822
|
994 |
|
|
|a 92
|b IZTAP
|