Cargando…

Seven deadliest network attacks /

Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Prowell, Stacy J.
Otros Autores: Kraus, Rob, Borkin, Mike
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam ; Boston : Syngress, �2010.
Colección:Syngress seven deadliest attacks series.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_ocn613962609
003 OCoLC
005 20231117033126.0
006 m o d
007 cr cn|||||||||
008 100513s2010 ne a ob 001 0 eng d
010 |a  2010014462 
040 |a OPELS  |b eng  |e pn  |c OPELS  |d CDX  |d OCLCQ  |d N$T  |d YDXCP  |d EBLCP  |d E7B  |d OCLCQ  |d TEFOD  |d OCLCQ  |d DEBSZ  |d VLB  |d OCLCQ  |d OCLCO  |d VT2  |d C6I  |d U9X  |d OCLCF  |d IDEBK  |d UKDOC  |d TEFOD  |d OCLCQ  |d OCLCO  |d COO  |d OCLCO  |d OCLCQ  |d OCLCO  |d LIV  |d OCLCQ  |d MERUC  |d OCLCQ  |d D6H  |d OCLCQ  |d WYU  |d UAB  |d LEAUB  |d UKAHL  |d OL$  |d ERF  |d OCLCQ  |d UHL  |d UKBTH  |d BRF  |d OCLCO  |d TAC  |d OCLCO  |d OCLCQ 
019 |a 664571793  |a 680619808  |a 712992665  |a 729018359  |a 803494739  |a 816577089  |a 823124464  |a 823847456  |a 823917318  |a 824101473  |a 824159422  |a 1064107731  |a 1102539047  |a 1103280220  |a 1112559544  |a 1112952418  |a 1113089516  |a 1129342830  |a 1152981811  |a 1192336668  |a 1240530813  |a 1264807216  |a 1302698151  |a 1355686313 
020 |a 9781597495509  |q (electronic bk.) 
020 |a 1597495506  |q (electronic bk.) 
020 |a 1282738259 
020 |a 9781282738256 
020 |z 9781597495493 
020 |z 1597495492 
024 8 |a C20090619140 
024 8 |a 9781597495493 
035 |a (OCoLC)613962609  |z (OCoLC)664571793  |z (OCoLC)680619808  |z (OCoLC)712992665  |z (OCoLC)729018359  |z (OCoLC)803494739  |z (OCoLC)816577089  |z (OCoLC)823124464  |z (OCoLC)823847456  |z (OCoLC)823917318  |z (OCoLC)824101473  |z (OCoLC)824159422  |z (OCoLC)1064107731  |z (OCoLC)1102539047  |z (OCoLC)1103280220  |z (OCoLC)1112559544  |z (OCoLC)1112952418  |z (OCoLC)1113089516  |z (OCoLC)1129342830  |z (OCoLC)1152981811  |z (OCoLC)1192336668  |z (OCoLC)1240530813  |z (OCoLC)1264807216  |z (OCoLC)1302698151  |z (OCoLC)1355686313 
050 4 |a TK5105.59  |b .P76 2010 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a UTN  |2 bicssc 
082 0 4 |a 005.8  |2 22 
100 1 |a Prowell, Stacy J. 
245 1 0 |a Seven deadliest network attacks /  |c Stacy Prowell, Rob Kraus, Mike Borkin. 
260 |a Amsterdam ;  |a Boston :  |b Syngress,  |c �2010. 
300 |a 1 online resource (xiv, 142 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
490 1 |a Syngress seven deadliest attacks series 
520 |a Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree Attacks Man-in-the-Middle Password Replay Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable. 
505 0 |a Introduction -- Chapter 1: Denial of Service -- Chapter 2: War Dialing -- Chapter 3: Penetration "Testing" -- Chapter 4: Protocol Tunneling -- Chapter 5: Spanning Tree Attacks -- Chapter 6: Man-in-the-Middle -- Chapter 7: Password Replay. 
504 |a Includes bibliographical references and index. 
505 0 |a Denial of service -- War dialing -- Penetration "testing" -- Protocol tunneling -- Spanning tree attacks -- Man-in-the-middle -- Password replay. 
588 0 |a Print version record. 
542 |f Copyright &#169: Elsevier Science & Technology  |g 2010 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer networks  |x Access control. 
650 6 |a R�eseaux d'ordinateurs  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0263812 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Access control.  |2 fast  |0 (OCoLC)fst00872298 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
700 1 |a Kraus, Rob. 
700 1 |a Borkin, Mike. 
776 0 8 |i Print version:  |a Prowell, Stacy J.  |t Seven deadliest network attacks.  |d Amsterdam ; Boston : Syngress, �2010  |z 9781597495493  |z 1597495492  |w (DLC) 2010014462  |w (OCoLC)609304013 
830 0 |a Syngress seven deadliest attacks series. 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9781597495493  |z Texto completo