Vista normal Vista MARC Vista ISBD

Counter hack : a step-by-step guide to computer attacks and effective defenses /

por Skoudis, Ed [autor]; Liston, Tom [autor].
Series: The Radia Perlman Series in Computer Networking and Security.Edición: Second edition.Descripción: xxxii, 748 p. : il·lustracions, 23 cm.ISBN: 0131481045; 9780131481046.Tema(s): Pirates (informàtica) | Seguretat informàtica | Protecció de dades
Contenidos:
1. Introduction 2. Neworking overview : pretty much everything you need to know about networking to follow the rest of this book 3. Linux and UNIX overview : pretty much everything you need to know aboutLinux and UNIX to follow the rest of this book 4. Windows NT/2000/XP/2003 overview : pretty much everything you need to know about windows to follow the rest of this book 5. Phase I : Reconnaissance 6. Phase 2: Scanning 7. Phase 3 : Gaining access using application and operating system attacks 8. Phase 3 : Gaining access using network attacks 9. Denial-of-service attacks 10. Phase 4 : Maintaining access : trojans, backdoors,and rooktits...Oh my! 11. Phase 5 : Covering tracks and hiding 12. Putting it all together : anatomy of an attack 13. The future, references, and conclusions
Tipo de ítem: Llibre
Lista(s) en las que aparece este ítem: Últimes adquisicions 19-20
    valoración media: 0.0 (0 votos)
Tipo de ítem: Ubicación Signatura topográfica Estado Fecha de devolución Código de barras Ítem reservado
Llibre Llibre Fons general C-K.6.5 SKO cou Disponible 124351
Total reservas: 0

Inclou índex

1. Introduction
2. Neworking overview : pretty much everything you need to know about networking to follow the rest of this book
3. Linux and UNIX overview : pretty much everything you need to know aboutLinux and UNIX to follow the rest of this book
4. Windows NT/2000/XP/2003 overview : pretty much everything you need to know about windows to follow the rest of this book
5. Phase I : Reconnaissance
6. Phase 2: Scanning
7. Phase 3 : Gaining access using application and operating system attacks
8. Phase 3 : Gaining access using network attacks
9. Denial-of-service attacks
10. Phase 4 : Maintaining access : trojans, backdoors,and rooktits...Oh my!
11. Phase 5 : Covering tracks and hiding
12. Putting it all together : anatomy of an attack
13. The future, references, and conclusions

Inicio | Ayuda | Biblioteca | Escoles Universitàries Gimbernat

© Fundació Escoles Universitàries Gimbernat