000 | 01275cam a2200277Ia 4500 | ||
---|---|---|---|
001 | 148759915 | ||
003 | APU | ||
005 | 20160127051504.0 | ||
008 | 070125s2008 maua b 001 0 eng d | ||
020 | _a9781418048266 (pbk.) | ||
020 | _a1418048267 (pbk.) | ||
035 | _a(OCoLC)148759915 | ||
040 |
_aBTCTA _cBTCTA _dSUMAN _dANA _beng |
||
050 |
_aTK5105.59 _b.B37 2008 |
||
082 |
_221 _a005.8 _bBAS 2008 |
||
100 | 1 |
_aBasta, Alfred. _912955 |
|
245 | 1 | 0 |
_aComputer security and penetration testing / _cAlfred Basta and Wolf Halton. |
260 |
_aBoston : _bThomson, _cc2008. |
||
300 |
_axvii, 414 p. : _bill. ; _c24 cm. |
||
500 | _aIncludes Index. | ||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aEthics of hacking and cracking -- Reconnaissance -- Scanning tools -- Sniffers -- TCP/IP vulnerabilities -- Encryption and password cracking -- Spoofing -- Session hijacking -- Hacking network devices -- Trojan horses -- Denial-of-service attacks -- Buffer overflows -- Programming exploits -- Mail vulnerabilities -- Web application vulnerabilities -- Windows vulnerabilities -- Linux vulnerabilities -- Incident handling. | |
650 | 0 |
_aComputer networks _xSecurity measures. _977 |
|
700 | 1 |
_aHalton, Wolf. _912956 |
|
942 |
_2lcc _cBook _09 |
||
999 |
_c7053 _d7053 |