| 000 | 01574cam a22003374a 4500 | ||
|---|---|---|---|
| 001 | 2009419532 | ||
| 003 | DLC | ||
| 005 | 20191218020002.0 | ||
| 008 | 090608s2008 cc a b 001 0 eng | ||
| 010 | _a 2009419532 | ||
| 020 | _a9780596510305 | ||
| 020 | _a0596510306 | ||
| 040 |
_aDLC _cDLC _dDLC |
||
| 050 | 0 | 0 |
_aQA76.9.A25 _bM4355 2008 |
| 082 | 0 | 0 |
_a005.8 _222 |
| 100 | 1 |
_aMcNab, Chris _q(Chris R.), _d1980- |
|
| 245 | 1 | 0 |
_aNetwork security assessment / _cChris McNab. |
| 250 | _a2nd ed. | ||
| 260 |
_aBeijing ; _aSebastopol : _bO'Reilly Media, Inc., _cc2008. |
||
| 300 |
_axxiv, 478 p. : _bill. ; _c26 cm. |
||
| 504 | _aIncludes bibliographical references (p. 420-421) and index. | ||
| 520 | _aThe book demonstrates how a determined attacker scours Internet-based networks in search of vulnerable components, from the network to the application level. This new edition is up-to-date on the latest hacking techniques, but rather than focus on individual issues, it looks at the bigger picture by grouping and analyzing threats at a high-level. | ||
| 590 | _arua 30/10/13 | ||
| 591 | _aLoans | ||
| 650 | 0 |
_aComputers _xAccess control _xEvaluation. |
|
| 650 | 0 |
_aComputer networks _xSecurity measures _xEvaluation. |
|
| 856 | 4 | 2 |
_3Contributor biographical information _uhttp://www.loc.gov/catdir/enhancements/fy0913/2009419532-b.html |
| 856 | 4 | 2 |
_3Publisher description _uhttp://www.loc.gov/catdir/enhancements/fy0915/2009419532-d.html |
| 856 | 4 | 1 |
_3Table of contents only _uhttp://www.loc.gov/catdir/enhancements/fy1010/2009419532-t.html |
| 942 |
_2ddc _cBOOK _05 |
||
| 999 |
_c687 _d687 |
||