000 01816nam a2200229 4500
001 vtls002256060
003 MY-SjTCS
005 20200306153852.0
008 110218s2002 njua 001 eng
020 _a0130332739
039 9 _a201909201142
_bummi
_c201102181241
_dVLOAD
_y200407271931
_zVLOAD
082 0 4 _a005.8
_bSKO
100 1 _aSkoudis, Ed.
_9203821
245 1 0 _aCounter hack :
_ba step-by-step guide to computer attacks and effective defenses /
_cEd Skoudis
260 _aUpper Saddle River, N.J. :
_bPrentice Hall PTR,
_cc2002
300 _axxii, 564 p. :
_bill. ;
_c23 cm.
440 0 _aPrentice Hall series in computer networking and distributed systems / Radia Perlman, series editor
_9203822
505 0 _aForeword. - Preface. - Ch. 1 Introduction. - Ch. 2. Networking Overview: Pretty Much Everything You Need to Know about TCP/IP to Follow the Rest of This Book, in 55 Pages or Less. - Ch. 3. UNIX Overview: Pretty Much Everything You Need to Know about UNIX to Follow the Rest of This Book, in 30 Pages or Less. - Ch. 4. Windows NT/2000 Overview : Pretty Much Everything You Need to Know about Windows to Follow the Rest of This Book, in 40 Pages or Less. - Ch. 5. Phase 1: Reconnaissance. - Ch. 6. Phase 2 : Scanning. - Ch. 7. Phase 3 : Gaining Access Using Application and Operating System Attacks. - Ch. 8. Phase 3 : Gaining Access Using Network Attacks. - Ch. 9. Phase 3 : Denial-of-Service Attacks. - Ch. 10. Phase 4 : Maintaining Access : Trojans, Backdoors, and RootKits ... Oh My! - Ch. 11. Phase 5 : Covering Tracks and Hiding. - Ch. 12. Putting It All Together : Anatomy of an Attack. - Ch. 13. The Future, Resources, and Conclusions. - Glossary. - Index.
650 0 _aComputer networks
_xSecurity measures.
_99098
650 0 _aData protection.
_9203823
920 _aCIT(DIP) : 540129
999 _c22572
_d22572