Local cover image
Local cover image

Hacking exposed : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz.

By: McClure, Stuart [autor.]Contributor(s): Scambray, Joel | Kurtz, GeorgeMaterial type: TextTextLanguage: English Publisher: California : Osborne/McGraw-Hill, 2012Description: xxiv, 741 páginas : Ilustraciones ; 23 cmContent type: texto Media type: sin mediación Carrier type: volumenISBN: 9780071780285Subject(s): Seguridad informática | Protección de datos | Cifrado de datos (Computadores) | Inteligencia artificial -- Medidas de seguridad | Sistemas de detección de intrusos (Seguridad informática) | HackersDDC classification: 005.8
Contents:
Footprinting ; Scanning ; Enumeration ; Hacking Windows ; Hacking UNIX ; Remote Connectivity and VoIP Hacking ; Network Devices (Expanded) ; Wireless Devices (Expanded) ; Embedded Systems (NEW) ; Web Hacking ; Countermeasures Map (NEW)Appendix A: PortsAppendix B: Top 14 Security Vulnerabilities Appendix C: Denial of Service (DoS).
Abstract: High-profile viruses and hacking incidents serve to highlight the dangers of system security breaches. This revised text provides network administrators with a reference for implementing and maintaining sound security policies.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode Item holds
Libros Libros Biblioteca CESA

Diagonal 34 A No. 5 A - 23 

Casa Incolda

PBX: 339 53 00

serviciosbiblioteca@cesa.edu.co

Piso 2
General 005.8 / M478h 2012 (Browse shelf(Opens below)) Ej. 1 Available 7110001625
Total holds: 0

Incluye índice.

Footprinting ; Scanning ; Enumeration ; Hacking Windows ; Hacking UNIX ; Remote Connectivity and VoIP Hacking ; Network Devices (Expanded) ; Wireless Devices (Expanded) ; Embedded Systems (NEW) ; Web Hacking ; Countermeasures Map (NEW)Appendix A: PortsAppendix B: Top 14 Security Vulnerabilities Appendix C: Denial of Service (DoS).

High-profile viruses and hacking incidents serve to highlight the dangers of system security breaches. This revised text provides network administrators with a reference for implementing and maintaining sound security policies.

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image
Hola