|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn354466120 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
090528s2006 mau o 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d OCLCQ
|d CEF
|d OCLCQ
|d NHM
|d DEBSZ
|d OCLCQ
|d OCLCO
|d CNNAI
|d OCLCQ
|d OCLCO
|d OCLCQ
|
020 |
|
|
|a 9781597491235
|
020 |
|
|
|a 1597491233
|
029 |
1 |
|
|a DEBSZ
|b 355443465
|
029 |
1 |
|
|a HEBIS
|b 29151376X
|
035 |
|
|
|a (OCoLC)354466120
|
037 |
|
|
|a CL0500000039
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.59
|b .S432 2006
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Seagren, Eric.
|
245 |
1 |
0 |
|a Secure your network for free :
|b using Nmap, Wireshark, Snort, Nessus, and MRGT /
|c Eric Seagren.
|
260 |
|
|
|a Rockland, Mass. :
|b Syngress ;
|a Oxford :
|b Elsevier Science [distributor],
|c 2006.
|
300 |
|
|
|a 1 online resource (xiv, 493 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Ch. 1. Presenting the business case for free solutions -- Ch. 2. Protecting your perimeter -- Ch. 3. Protecting network resources -- Ch. 4. Configuring an intrusion detection system -- Ch. 5. Managing event logs -- Ch. 6. Testing and auditing your systems -- Ch. 7. Network reporting and troubleshooting -- Ch. 8. Security as an ongoing process.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Computer networks
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|x Software.
|2 blmlsh
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781597491235/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|