000 | 01816nam a2200229 4500 | ||
---|---|---|---|
001 | vtls002256060 | ||
003 | MY-SjTCS | ||
005 | 20200306153852.0 | ||
008 | 110218s2002 njua 001 eng | ||
020 | _a0130332739 | ||
039 | 9 |
_a201909201142 _bummi _c201102181241 _dVLOAD _y200407271931 _zVLOAD |
|
082 | 0 | 4 |
_a005.8 _bSKO |
100 | 1 |
_aSkoudis, Ed. _9203821 |
|
245 | 1 | 0 |
_aCounter hack : _ba step-by-step guide to computer attacks and effective defenses / _cEd Skoudis |
260 |
_aUpper Saddle River, N.J. : _bPrentice Hall PTR, _cc2002 |
||
300 |
_axxii, 564 p. : _bill. ; _c23 cm. |
||
440 | 0 |
_aPrentice Hall series in computer networking and distributed systems / Radia Perlman, series editor _9203822 |
|
505 | 0 | _aForeword. - Preface. - Ch. 1 Introduction. - Ch. 2. Networking Overview: Pretty Much Everything You Need to Know about TCP/IP to Follow the Rest of This Book, in 55 Pages or Less. - Ch. 3. UNIX Overview: Pretty Much Everything You Need to Know about UNIX to Follow the Rest of This Book, in 30 Pages or Less. - Ch. 4. Windows NT/2000 Overview : Pretty Much Everything You Need to Know about Windows to Follow the Rest of This Book, in 40 Pages or Less. - Ch. 5. Phase 1: Reconnaissance. - Ch. 6. Phase 2 : Scanning. - Ch. 7. Phase 3 : Gaining Access Using Application and Operating System Attacks. - Ch. 8. Phase 3 : Gaining Access Using Network Attacks. - Ch. 9. Phase 3 : Denial-of-Service Attacks. - Ch. 10. Phase 4 : Maintaining Access : Trojans, Backdoors, and RootKits ... Oh My! - Ch. 11. Phase 5 : Covering Tracks and Hiding. - Ch. 12. Putting It All Together : Anatomy of an Attack. - Ch. 13. The Future, Resources, and Conclusions. - Glossary. - Index. | |
650 | 0 |
_aComputer networks _xSecurity measures. _99098 |
|
650 | 0 |
_aData protection. _9203823 |
|
920 | _aCIT(DIP) : 540129 | ||
999 |
_c22572 _d22572 |