Cargando…

Hackers Beware /

Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do...

Descripción completa

Detalles Bibliográficos
Autor principal: Cole, Eric (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sams, 2001.
Edición:1st edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ma 4500
001 OR_on1100904884
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 160701s2001 xx o 000 0 eng d
040 |a CEF  |b eng  |e pn  |c CEF  |d OCLCO  |d OCLCF  |d CNCEN  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
020 |z 0735710090 
020 |z 9780735710092 
024 8 |a 9780735710092 
024 8 |a 0735710090 
029 1 |a AU@  |b 000067113656 
035 |a (OCoLC)1100904884 
082 0 4 |a 005.8  |q OCoLC  |2 21/eng/20230216 
049 |a UAMI 
100 1 |a Cole, Eric,  |e author. 
245 1 0 |a Hackers Beware /  |c Cole, Eric. 
250 |a 1st edition. 
264 1 |b Sams,  |c 2001. 
300 |a 1 online resource (800 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
365 |b 45.00 
520 |a Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that"--The techniques hackers use to break into systems. Hackers Beware is unique in that it gives specific exploits, exactly how they work and how to protect against them. This book will help readers understand what security threats they are up against and what they need to do to protect against them. Some books cover this from a high level but do not get into the details of specific exploits and cover it in a case by case fashion. This book will cover the complete picture. It will not only describe how an exploit works but present the signature of the attack, what to look for on a network and how to protect against it. 
542 |f Copyright © Sams  |g 2001 
550 |a Made available through: Safari, an O'Reilly Media Company. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Hackers. 
650 6 |a Sécurité informatique. 
650 6 |a Pirates informatiques. 
650 7 |a Computer security  |2 fast 
650 7 |a Hackers  |2 fast 
856 4 0 |u https://learning.oreilly.com/library/view/~/0735710090/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP