語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Seven deadliest network attacks
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Seven deadliest network attacks/ Stacy Prowell, Rob Kraus, Mike Borkin.
作者:
Prowell, Stacy J.
其他作者:
Kraus, Rob.
出版者:
Amsterdam ;Syngress, : c2010.,
面頁冊數:
1 online resource (xiv, 142 p.) :ill. :
標題:
Computer networks - Security measures. -
電子資源:
http://www.sciencedirect.com/science/book/9781597495493
ISBN:
9781597495493
Seven deadliest network attacks
Prowell, Stacy J.
Seven deadliest network attacks
[electronic resource] /Stacy Prowell, Rob Kraus, Mike Borkin. - Amsterdam ;Syngress,c2010. - 1 online resource (xiv, 142 p.) :ill. - Syngress seven deadliest attacks series. - Syngress seven deadliest attacks series..
Includes bibliographical references and index.
Introduction -- Chapter 1: Denial of Service -- Chapter 2: War Dialing -- Chapter 3: Penetration "Testing" -- Chapter 4: Protocol Tunneling -- Chapter 5: Spanning Tree Attacks -- Chapter 6: Man-in-the-Middle -- Chapter 7: Password Replay.
Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree Attacks Man-in-the-Middle Password Replay Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.
ISBN: 9781597495493
Source: 1094156:10886781Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Topical Terms:
555385
Computer networks
--Security measures.Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: TK5105.59 / .P76 2010
Dewey Class. No.: 005.8
Seven deadliest network attacks
LDR
:03065cam 2200469Ia 4500
001
691467
003
OCoLC
005
20111122091344.0
006
m d
007
cr cn|||||||||
008
120103s2010 ne a ob 001 0 eng d
019
$a
664571793
$a
680619808
$a
712992665
020
$a
9781597495493
020
$a
1597495492
020
$a
9781597495509 (electronic bk.)
020
$a
1597495506 (electronic bk.)
029
1
$a
AU@
$b
000045963940
029
1
$a
NZ1
$b
13448977
035
$a
(OCoLC)613962609
$z
(OCoLC)664571793
$z
(OCoLC)680619808
$z
(OCoLC)712992665
035
$a
ocn613962609
037
$a
1094156:10886781
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$b
eng
$c
OPELS
$d
CDX
$d
OCLCQ
$d
N$T
$d
YDXCP
$d
EBLCP
$d
E7B
$d
OCLCQ
049
$a
TEFA
050
4
$a
TK5105.59
$b
.P76 2010
072
7
$a
COM
$x
060040
$2
bisacsh
072
7
$a
COM
$x
043050
$2
bisacsh
072
7
$a
COM
$x
053000
$2
bisacsh
082
0 4
$a
005.8
$2
22
100
1
$a
Prowell, Stacy J.
$3
813049
245
1 0
$a
Seven deadliest network attacks
$h
[electronic resource] /
$c
Stacy Prowell, Rob Kraus, Mike Borkin.
260
$a
Amsterdam ;
$a
Boston :
$b
Syngress,
$c
c2010.
300
$a
1 online resource (xiv, 142 p.) :
$b
ill.
490
1
$a
Syngress seven deadliest attacks series
504
$a
Includes bibliographical references and index.
505
0
$a
Introduction -- Chapter 1: Denial of Service -- Chapter 2: War Dialing -- Chapter 3: Penetration "Testing" -- Chapter 4: Protocol Tunneling -- Chapter 5: Spanning Tree Attacks -- Chapter 6: Man-in-the-Middle -- Chapter 7: Password Replay.
505
0
$a
Denial of service -- War dialing -- Penetration "testing" -- Protocol tunneling -- Spanning tree attacks -- Man-in-the-middle -- Password replay.
520
$a
Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree Attacks Man-in-the-Middle Password Replay Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.
588
$a
Description based on print version record.
650
0
$a
Computer networks
$x
Security measures.
$3
555385
650
0
$a
Computer networks
$x
Access control.
$3
784848
650
4
$a
Access control.
$3
813052
650
4
$a
Computer networks.
$3
528577
650
4
$a
Security measures.
$3
813048
650
4
$a
Computer science.
$3
573171
650
4
$a
Engineering.
$3
561152
650
4
$a
Electrical engineering.
$3
596380
650
7
$a
COMPUTERS
$x
Internet
$x
Security.
$2
bisacsh
$3
811588
650
7
$a
COMPUTERS
$x
Networking
$x
Security.
$2
bisacsh
$3
811589
650
7
$a
COMPUTERS
$x
Security
$x
General.
$2
bisacsh
$3
811590
655
4
$a
Electronic books.
$2
local
$3
554714
700
1
$a
Kraus, Rob.
$3
813050
700
1
$a
Borkin, Mike.
$3
813051
830
0
$a
Syngress seven deadliest attacks series.
$3
813041
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781597495493
938
$a
Coutts Information Services
$b
COUT
$n
14948506
$c
24.95 USD
938
$a
YBP Library Services
$b
YANK
$n
3250465
938
$a
EBL - Ebook Library
$b
EBLB
$n
EBL566706
938
$a
ebrary
$b
EBRY
$n
ebr10408189
994
$a
C0
$b
TEF
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入