Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses

Enregistré dans:
Détails bibliographiques
Autres auteurs : Skoudis Ed (Auteur), Liston Tom (Auteur)
Format : Livre
Langue : anglais
Titre complet : Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses / Ed Skoudis with Tom Liston
Édition : 2nd edition
Publié : Upper Saddle River, NJ : Prentice Hall Professional Technical Reference , cop. 2006
Description matérielle : 1 vol. (XXXII-748 p.)
Collection : Radia Perlman series in computer networking and security
Contenu : Introduction. Networking overview: pretty much everything you need to know about networking to follow the rest of this book. Linux and UNIX overview: pretty much everything you need to know about Linux and UNIX to follow the rest of this book. Windows NT/2000/XP/2003 overview: pretty much everything you need to know about windows to follow the rest of this book. Phase 1: reconnaissance. Phase 2: scanning. Phase 3: gaining access using application and operating system attacks. Phase 3: gaining access using network attacks. Phase 3: denial-of-service attacks. Phase 4: maintaining access: trojans, backdoors, and rootkits...Oh my!. Phase 5: covering tracks and hiding. Putting it all together: anatomy of an attack. The future, references, and conclusions
Sujets :
LEADER 02528cam a2200553 4500
001 PPN137954972
003 http://www.sudoc.fr/137954972
005 20230710130400.0
010 |a 0-13-148104-5  |b br. 
010 |a 978-0-13-148104-6  |b br. 
020 |a US  |b 2005027164 
020 |a GB  |b A572845 
035 |a (OCoLC)718468200 
035 |a ocm61694770 
035 |z ocm65464983 
100 |a 20091117d2006 m y0frey0103 ba 
101 0 |a eng  |2 639-2 
102 |a US 
105 |a a ||||001|y 
106 |a r 
181 |6 z01  |c txt  |2 rdacontent 
181 1 |6 z01  |a i#  |b xxxe## 
182 |6 z01  |c n  |2 rdamedia 
182 1 |6 z01  |a n 
200 1 |a Counter hack reloaded  |e a step-by-step guide to computer attacks and effective defenses  |f Ed Skoudis with Tom Liston 
205 |a 2nd edition 
210 |a Upper Saddle River, NJ  |c Prentice Hall Professional Technical Reference  |d cop. 2006 
215 |a 1 vol. (XXXII-748 p.)  |c ill., couv. ill. en coul.  |d 24 cm 
225 2 |a Radia Perlman series in computer networking and security 
301 |a YDXCP 
301 |a AU@ 
301 |a NZ1 
320 |a Notes bibliogr. Index 
327 0 |a Introduction  |a Networking overview: pretty much everything you need to know about networking to follow the rest of this book  |a Linux and UNIX overview: pretty much everything you need to know about Linux and UNIX to follow the rest of this book  |a Windows NT/2000/XP/2003 overview: pretty much everything you need to know about windows to follow the rest of this book  |a Phase 1: reconnaissance  |a Phase 2: scanning  |a Phase 3: gaining access using application and operating system attacks  |a Phase 3: gaining access using network attacks  |a Phase 3: denial-of-service attacks  |a Phase 4: maintaining access: trojans, backdoors, and rootkits...Oh my!  |a Phase 5: covering tracks and hiding  |a Putting it all together: anatomy of an attack  |a The future, references, and conclusions 
410 | |t Radia Perlman series in computer networking and security 
517 | |a Counter hack 
606 |3 PPN034488448  |a Réseaux d'ordinateurs  |x Mesures de sûreté  |2 rameau 
606 |3 PPN040813215  |a Sécurité informatique  |2 rameau 
676 |a 005.8  |v 22 
680 |a TK5105.59  |b .S57 2006 
702 1 |3 PPN107748096  |a Skoudis  |b Ed  |f 19..-....  |4 070 
702 1 |a Liston  |b Tom  |4 070 
801 1 |a US  |b OCLC  |g AACR2 
801 2 |a FR  |b AUROC  |g AFNOR 
801 3 |a FR  |b Abes  |c 20200225  |g AFNOR 
801 0 |b DLC  |g AACR2 
801 2 |b YDX  |g AACR2 
930 |5 441092104:404655475  |b 441092104  |j u 
998 |a 581326