000 01574cam a22003374a 4500
001 2009419532
003 DLC
005 20191218020002.0
008 090608s2008 cc a b 001 0 eng
010 _a 2009419532
020 _a9780596510305
020 _a0596510306
040 _aDLC
_cDLC
_dDLC
050 0 0 _aQA76.9.A25
_bM4355 2008
082 0 0 _a005.8
_222
100 1 _aMcNab, Chris
_q(Chris R.),
_d1980-
245 1 0 _aNetwork security assessment /
_cChris McNab.
250 _a2nd ed.
260 _aBeijing ;
_aSebastopol :
_bO'Reilly Media, Inc.,
_cc2008.
300 _axxiv, 478 p. :
_bill. ;
_c26 cm.
504 _aIncludes bibliographical references (p. 420-421) and index.
520 _aThe book demonstrates how a determined attacker scours Internet-based networks in search of vulnerable components, from the network to the application level. This new edition is up-to-date on the latest hacking techniques, but rather than focus on individual issues, it looks at the bigger picture by grouping and analyzing threats at a high-level.
590 _arua 30/10/13
591 _aLoans
650 0 _aComputers
_xAccess control
_xEvaluation.
650 0 _aComputer networks
_xSecurity measures
_xEvaluation.
856 4 2 _3Contributor biographical information
_uhttp://www.loc.gov/catdir/enhancements/fy0913/2009419532-b.html
856 4 2 _3Publisher description
_uhttp://www.loc.gov/catdir/enhancements/fy0915/2009419532-d.html
856 4 1 _3Table of contents only
_uhttp://www.loc.gov/catdir/enhancements/fy1010/2009419532-t.html
942 _2ddc
_cBOOK
_05
999 _c687
_d687