|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
SCIDIR_ocm52687248 |
003 |
OCoLC |
005 |
20231117015040.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
030720s2003 maua o 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d OCLCQ
|d TNF
|d OCLCQ
|d OCLCF
|d OCLCO
|d OPELS
|d DKDLA
|d MERUC
|d CCO
|d E7B
|d HNW
|d EBLCP
|d NTG
|d WPG
|d REDDC
|d YDXCP
|d U5D
|d CSU
|d DEBSZ
|d OCLCQ
|d AZK
|d LOA
|d COCUF
|d CNNOR
|d SUR
|d MOR
|d PIFBR
|d LIV
|d OCLCQ
|d OCLCO
|d WY@
|d U3W
|d LUE
|d STF
|d BRL
|d WRM
|d D6H
|d NRAMU
|d INT
|d VT2
|d TOF
|d OCLCQ
|d COO
|d G3B
|d TKN
|d OCLCQ
|d AU@
|d LEAUB
|d OL$
|d OCLCQ
|d OCLCO
|d OCLCQ
|d IOY
|d OCLCQ
|d INARC
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 56813545
|a 62888527
|a 70757084
|a 162723667
|a 475383587
|a 559619432
|a 606021381
|a 646713421
|a 722150338
|a 740948709
|a 856959912
|a 961531363
|a 961599031
|a 962563839
|a 962681562
|a 984884865
|a 991991851
|a 1000410473
|a 1037510926
|a 1053322873
|a 1058041743
|
020 |
|
|
|a 1932266879
|q (electronic bk.)
|
020 |
|
|
|a 9781932266870
|q (electronic bk.)
|
020 |
|
|
|a 9781931836692
|
020 |
|
|
|a 1931836698
|
035 |
|
|
|a (OCoLC)52687248
|z (OCoLC)56813545
|z (OCoLC)62888527
|z (OCoLC)70757084
|z (OCoLC)162723667
|z (OCoLC)475383587
|z (OCoLC)559619432
|z (OCoLC)606021381
|z (OCoLC)646713421
|z (OCoLC)722150338
|z (OCoLC)740948709
|z (OCoLC)856959912
|z (OCoLC)961531363
|z (OCoLC)961599031
|z (OCoLC)962563839
|z (OCoLC)962681562
|z (OCoLC)984884865
|z (OCoLC)991991851
|z (OCoLC)1000410473
|z (OCoLC)1037510926
|z (OCoLC)1053322873
|z (OCoLC)1058041743
|
050 |
|
4 |
|a TK5105.59
|b .B57 2003eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
100 |
1 |
|
|a Birkholz, Erik Pace.
|
245 |
1 |
0 |
|a Special ops :
|b host and network security for Microsoft, UNIX, and Oracle /
|c by Erik Pace Birkholz ; special forward by Stuart McClure.
|
260 |
|
|
|a Rockland, Mass. :
|b Syngress Pub.,
|c �2003.
|
300 |
|
|
|a 1 online resource (xxiv, 1014 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Foreword by Stuart McClure -- Part I: METHODOLOGY -- Chapter 1: Defining Scope for the Project -- Chapter 2: Identifying Targets -- Chapter 3: High Severity Vulnerabilities -- Chapter 4: Vulnerability Mapping -- Chapter 5: Penetration Techniques -- Part II: TACTICAL -- Chapter 6: Windows 2000 Operating System -- Chapter 7: Windows XP Operating System -- Chapter 8: Windows Active Directory -- Chapter 9: Exchange Server & OWA -- Chapter 10: Terminal Server -- Chapter 11: Microsoft IIS -- Chapter 12: Attacking Web Applications -- Chapter 13: Attacking and Defending SQL -- Chapter 14: Attacking and Defending Oracle -- Chapter 15: Defending UNIX -- Chapter 16: Attacking and Defending Solaris -- Chapter 17: Creating Custom Tools -- Chapter 18: Network Architecture -- Chapter 19: Building and Attacking Wireless Networks -- Part III: STRATEGIC -- Chapter 20: Internal Security Teams -- Chapter 21: Public Source Information -- Chapter 22: Security Policies -- Chapter 23: Internal Education Programs.
|
520 |
|
|
|a Special Ops: Internal Network Security Guide is the solution for the impossible 24-hour IT work day. By now, most companies have hardened their perimeters and locked out the "bad guys," but what has been done on the inside? This book attacks the problem of the soft, chewy center in internal networks. We use a two-pronged approach-Tactical and Strategic-to give readers a complete guide to internal penetration testing. Content includes the newest vulnerabilities and exploits, assessment methodologies, host review guides, secure baselines and case studies to bring it all together. We have scoured the Internet and assembled some of the best to function as Technical Specialists and Strategic Specialists. This creates a diversified project removing restrictive corporate boundaries. The unique style of this book will allow it to cover an incredibly broad range of topics in unparalleled detail. Chapters within the book will be written using the same concepts behind software development. Chapters will be treated like functions within programming code, allowing the authors to call on each other's data. These functions will supplement the methodology when specific technologies are examined thus reducing the common redundancies found in other security books. This book is designed to be the "one-stop shop" for security engineers who want all their information in one place. The technical nature of this may be too much for middle management; however technical managers can use the book to help them understand the challenges faced by the engineers who support their businesses. �Unprecedented Team of Security Luminaries. Led by Foundstone Principal Consultant, Erik Pace Birkholz, each of the contributing authors on this book is a recognized superstar in their respective fields. All are highly visible speakers and consultants and their frequent presentations at major industry events such as the Black Hat Briefings and the 29th Annual Computer Security Institute Show in November, 2002 will provide this book with a high-profile launch. �The only all-encompassing book on internal network security. Windows 2000, Windows XP, Solaris, Linux and Cisco IOS and their applications are usually running simultaneously in some form on most enterprise networks. Other books deal with these components individually, but no other book provides a comprehensive solution like Special Ops. This book's unique style will give the reader the value of 10 books in 1
|
650 |
|
0 |
|a Firewalls (Computer security)
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer network architectures.
|
650 |
|
6 |
|a Coupe-feu (S�ecurit�e informatique)
|0 (CaQQLa)201-0344221
|
650 |
|
6 |
|a R�eseaux d'ordinateurs
|x S�ecurit�e
|x Mesures.
|0 (CaQQLa)201-0263812
|
650 |
|
6 |
|a R�eseaux d'ordinateurs
|x Architectures.
|0 (CaQQLa)201-0191572
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer network architectures
|2 fast
|0 (OCoLC)fst00872277
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Firewalls (Computer security)
|2 fast
|0 (OCoLC)fst00925719
|
650 |
1 |
7 |
|a Computernetwerken.
|2 gtt
|
650 |
1 |
7 |
|a Databescherming.
|2 gtt
|
650 |
1 |
7 |
|a Microsoft Windows.
|2 gtt
|
650 |
1 |
7 |
|a UNIX.
|2 gtt
|
650 |
1 |
7 |
|a Oracle.
|2 gtt
|
700 |
1 |
|
|a McClure, Stuart.
|
776 |
0 |
8 |
|i Print version:
|a Birkholz, Erik Pace.
|t Special ops.
|d Rockland, Mass. : Syngress Pub., �2003
|z 1931836698
|w (OCoLC)52263496
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9781931836692
|z Texto completo
|