Cargando…

Dissecting the hack : the f0rb1dd3n network /

"Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One-half thriller, one-half refere...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Street, Jayson E.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington, Mass. : Syngress/Elsevier, ©2010.
Edición:Rev. ed.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn701106275
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 110208s2010 maua ob 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d OCLCQ  |d DEBSZ  |d COO  |d B24X7  |d OCLCQ  |d VLB  |d UA@  |d OCLCF  |d OCLCQ  |d OCLCA  |d OCL  |d OCLCQ  |d OCLCA  |d OCLCO  |d OCLCQ 
019 |a 711756109  |a 765143754 
020 |a 9781597495691 
020 |a 1597495697 
020 |a 1597495689 
020 |a 9781597495684 
020 |z 9781597495684 
029 1 |a DEBSZ  |b 355444097 
029 1 |a GBVCP  |b 785355294 
029 1 |a HEBIS  |b 291514332 
035 |a (OCoLC)701106275  |z (OCoLC)711756109  |z (OCoLC)765143754 
037 |a CL0500000083  |b Safari Books Online 
050 4 |a HV8079.C65  |b S856 2010 
082 0 4 |a 364.16/8  |2 22 
049 |a UAMI 
245 0 0 |a Dissecting the hack :  |b the f0rb1dd3n network /  |c Jayson E. Street [and others]. 
246 3 |a Forbidden network 
250 |a Rev. ed. 
260 |a Burlington, Mass. :  |b Syngress/Elsevier,  |c ©2010. 
300 |a 1 online resource (xx, 333 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a "Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One-half thriller, one-half reference, each provides context for the other. Together they will show you how to see the digital world just below the surface of daily life. Yes, the security threats are real! In this revised edition the Part 2 content is completely NEW. Read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit, and expunge with the tools and techniques shown in the story."--Resource description page. 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
505 0 |a Front Cover; Half Title Page; Title Page; Copyright Page; Dedication; Table of Contents; Foreword; Acknowledgments; H0w t0 R34d Dissecting the Hack: The F0rb1dd3n Network; About the Authors; PART 1: F0RB1DD3N; PR010GU3; CHAPTER 0N3; CHAPTER TW0; CHAPTER THR33; CHAPTER F0UR; CHAPTER F1V3; CHAPTER S1X; CHAPTER S3V3N; CHAPTER E1GHT; CHAPTER N1N3; CHAPTER T3N; 3P1L0GU3; PART 2: SECURITY THREATS ARE REAL (STAR) 2.0; CHAPTER 1. Recon; CHAPTER 2. Scan; CHAPTER 3. Explore; CHAPTER 4. Exploit; CHAPTER 5. Expunge; CHAPTER 6. Hacker Culture; CHAPTER 7. Bit Bucket; Index. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer crimes  |x Investigation. 
650 0 |a Computer crimes  |v Case studies. 
650 0 |a Hackers. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 6 |a Criminalité informatique  |x Enquêtes. 
650 6 |a Criminalité informatique  |v Études de cas. 
650 6 |a Pirates informatiques. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a Computer crimes  |x Investigation.  |2 blmlsh 
650 7 |a Computer crimes  |x Case studies.  |2 blmlsh 
650 7 |a Computer hackers.  |2 blmlsh 
650 7 |a Computer networks  |x Security measures.  |2 blmlsh 
650 7 |a Computer security.  |2 blmlsh 
650 7 |a Computer crimes.  |2 fast  |0 (OCoLC)fst00872063 
650 7 |a Computer crimes  |x Investigation.  |2 fast  |0 (OCoLC)fst00872065 
650 7 |a Hackers.  |2 fast  |0 (OCoLC)fst00872150 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
655 7 |a Case studies.  |2 fast  |0 (OCoLC)fst01423765 
700 1 |a Street, Jayson E. 
700 1 |a Street, Jayson E.  |t Dissecting the hack. 
776 0 8 |i Print version:  |t Dissecting the hack.  |b Rev. ed.  |d Amsterdam ; Boston : Syngress, ©2010  |z 9781597495684  |w (DLC) 2010019906  |w (OCoLC)477275252 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597495684/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Books 24x7  |b B247  |n bks00037305 
994 |a 92  |b IZTAP