| 000 | 02911cam a22004817a 4500 | ||
|---|---|---|---|
| 001 | 15991611 | ||
| 003 | CATC | ||
| 005 | 20251125164301.0 | ||
| 008 | 091120s2009 nyua 001 0 eng | ||
| 010 | _a 2009517741 | ||
| 015 |
_aGBA8D3471 _2bnb |
||
| 016 | 7 |
_a014836258 _2Uk |
|
| 020 |
_a9780071613743 _qpbk. |
||
| 020 |
_a0071613749 _qpbk. |
||
| 035 | _a15991611 | ||
| 040 |
_aUKM _cComputer Arts & Technological College, Inc. _dBWX _dBTCTA _dBAKER _dYDXCP _dQBX _dVP@ _dIBI _dCQU _dSGB _dDLC |
||
| 041 | _aEnglish | ||
| 042 | _alccopycat | ||
| 082 | 0 | 4 |
_a005.8 M11h 2009 _222 |
| 100 | 1 | _aMcClure, Stuart | |
| 245 | 1 | 0 |
_aHacking exposed 6 : _bnetwork security secrets & solutions / _cby Stuart McClure ; Joel Scambray ; George Kurtz. |
| 246 | 1 | 4 | _aHacking 6 exposed |
| 246 | 3 | _aHacking exposed six | |
| 250 | _a10th anniversary ed. | ||
| 260 |
_aNew York : _bMcGraw-Hill , _c2009. |
||
| 300 |
_axxvii , 687 pp. : _bill. ; _c23 cm. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_aunmediated _bn _2rdamedia |
||
| 338 |
_avolume _bnc _2rdacarrier |
||
| 504 | _aIncludes appendices and index. | ||
| 505 | 0 | _aCasing the establishment. Footprinting -- Scanning -- Enumeration -- System hacking. Hacking Windows -- Hacking Unix -- Infrastructure hacking. Remote connectivity and VoIP hacking -- Network devices -- Wireless hacking -- Hacking hardware -- Application and data hacking. Hacking code -- Web hacking -- Hacking the internet user -- Appendices: Ports ; Top 14 security vulnerabilities ; Denial of service (DoS) and distributed denial of service (DDoS) attacks. | |
| 520 | _a"The phrase 'information security' has expanded significantly in scope over the last decade. The term now extends beyond protecting the secrets of major corporations and governments to include the average consumer. Our most sensitive information is stored online in vast quantities. The temptations for those who have the tools to dip an illicit, electronic spoon into the pool of confidential data are far too enticing to be ignored. Furthermore, cybercriminals are not scared of the laws that are currently in place. This volume of 'Hacking Exposed' contains the newest lessons learned about the threat landscape. Its goal is education: a paramount element in the continual fight against cybercrime. This book aims to educate those with the technical expertise to defend our nations, our educational institutions, our banks, our retailers, our utilities, our infrastructures, and our families." | ||
| 546 | _aEnglish. | ||
| 650 | 0 |
_aComputer networks _xSecurity measures. |
|
| 650 | 0 | _aComputer security. | |
| 650 | 0 | _aData protection. | |
| 700 | 1 | _aScambray, Joel. | |
| 700 | 1 | _aKurtz, George. | |
| 906 |
_a7 _bcbc _ccopycat _d2 _encip _f20 _gy-gencatlg |
||
| 942 |
_2ddc _cBK _n0 |
||
| 999 |
_c2626 _d2626 |
||