|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn180989309 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
071109s2007 cau ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d OCLCQ
|d CEF
|d OCLCQ
|d NHM
|d DEBSZ
|d N$T
|d EBLCP
|d OCLCQ
|d OCLCF
|d OCLCQ
|d TEFOD
|d YDXCP
|d TEFOD
|d OCLCQ
|d FEM
|d OCLCQ
|d OCLCA
|d INARC
|d MOQ
|d WYU
|d UAB
|d VT2
|d UKAHL
|d OCLCQ
|d CZL
|d DST
|d OCLCQ
|d KSU
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 609840736
|a 774401663
|a 968099284
|a 969014680
|a 1035679002
|a 1063869256
|a 1103269432
|a 1129362745
|a 1295598601
|a 1300480246
|a 1303361757
|
020 |
|
|
|a 9780596517564
|q (electronic bk.)
|
020 |
|
|
|a 0596517564
|q (electronic bk.)
|
020 |
|
|
|a 9780596554811
|q (electronic bk.)
|
020 |
|
|
|a 0596554818
|q (electronic bk.)
|
020 |
|
|
|z 9780596009632
|
020 |
|
|
|z 0596009631
|
029 |
1 |
|
|a AU@
|b 000048798387
|
029 |
1 |
|
|a AU@
|b 000062564107
|
029 |
1 |
|
|a DEBSZ
|b 355419653
|
029 |
1 |
|
|a DEBSZ
|b 396272851
|
029 |
1 |
|
|a DEBSZ
|b 396386830
|
029 |
1 |
|
|a HEBIS
|b 291491456
|
035 |
|
|
|a (OCoLC)180989309
|z (OCoLC)609840736
|z (OCoLC)774401663
|z (OCoLC)968099284
|z (OCoLC)969014680
|z (OCoLC)1035679002
|z (OCoLC)1063869256
|z (OCoLC)1103269432
|z (OCoLC)1129362745
|z (OCoLC)1295598601
|z (OCoLC)1300480246
|z (OCoLC)1303361757
|
037 |
|
|
|a CL0500000015
|b Safari Books Online
|
037 |
|
|
|a A0092050-21C1-45F3-80C0-DE49B84F9C85
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a TK5105.59
|b .S42 2007
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Security power tools /
|c Bryan Burns [and others].
|
260 |
|
|
|a Sebastopol, Calif. :
|b O'Reilly,
|c 2007.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
505 |
0 |
|
|a Part 1. Legal and ethics. Legal and ethics issues -- Part 2. Reconnaissance. Network scanning -- Vulnerability scanning -- LAN reconnaissance -- Wireless reconnaissance -- Custom packet generation -- Part 3. Penetration. Metasploit -- Wireless penetration -- Exploitation framework applications -- Custom exploitation -- Part 4. Control. Backdoors -- Rootkits -- Part 5. Defense. Proactive defense : firewalls -- Host hardening -- Securing communications -- Email security and anti-spam -- Device security testing -- Part 6. Monitoring. Network capture -- Network monitoring -- Host monitoring -- Part 7. Discovery. Forensics -- Application fuzzing -- Binary reverse engineering.
|
588 |
0 |
|
|a Print version record.
|
520 |
1 |
|
|a "Business objectives rely on the idea that people can find and use the services you provide. Designing Web Navigation gives you basic design principles, development techniques, and practical advice for creating effective navigation systems, with plenty of real-world examples. Well-researched and cited, it's an excellent reference and superb teaching guide, ideal for beginning to intermediate web designers, managers, other non-designers, and web development pros looking for a fresh perspective."--Jacket
|
504 |
|
|
|a Includes bibliographical references and index.
|
546 |
|
|
|a English.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Computer security.
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
700 |
1 |
|
|a Burns, Bryan.
|
776 |
0 |
8 |
|i Print version:
|t Security power tools.
|b 1st ed.
|d Sebastopol, CA : O'Reilly, ©2007
|z 0596009631
|w (DLC) 2008295186
|w (OCoLC)141384583
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780596009632/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH13754275
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL540572
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 415557
|
938 |
|
|
|a Internet Archive
|b INAR
|n isbn_9780596009632
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7427881
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3179972
|
994 |
|
|
|a 92
|b IZTAP
|