Hacking exposed : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz.
Material type:
TextPublication details: Emeryville, Calif. : McGraw-Hill/Osborne, 2005.Edition: 5th edDescription: xxiii, 692 p. : ill. ; 24 cmISBN: - 9780072260816
- Network security secrets & solutions
- Network security secrets and solutions
- 005.8 22
| Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|
Books
|
Main library General Stacks | 005.8 / MC.H 2005 (Browse shelf(Opens below)) | 1 | Available | 000354 | ||
Books
|
Main library General Stacks | 005.8 / MC.H 2005 (Browse shelf(Opens below)) | 2 | Available | 000631 |
Browsing Main library shelves, Shelving location: General Stacks Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| 005.8 / MA.A 2009 Applied security visualization / | 005.8 / MA.C 2009 Cloud security and privacy : | 005.8 / MA.S 2011 System assurance : | 005.8 / MC.H 2005 Hacking exposed : | 005.8 / MC.H 2005 Hacking exposed : | 005.8 / MC.S 2006 Software security : | 005.8 / MC.S 2006 Software security : |
Previous ed.: 2003.
Previous ed.: 2003.
Case study : Googling your way to insecurity -- Footprinting -- Footprintin -- Scanning -- Enumeration -- Hacking Window -- Hacking UNIX -- Remote connectivity and VoIP hacking -- Network devices -- Wireless hacking -- Firewalls -- Denial of service attacks -- Hacking code -- Web hacking -- Hacking the Internet user.
Here is the latest edition of international best-seller, Hacking Exposed. Using real-world case studies, renowned security experts Stuart McClure, Joel Scambray, and George Kurtz show IT professionals how to protect computers and networks against the most recent security vulnerabilities. You'll find detailed examples of the latest devious break-ins and will learn how to think like a hacker in order to thwart attacks. Coverage includes: Code hacking methods and countermeasures New exploits for Windows 2003 Server, UNIX/Linux, Cisco, Apache, and Web and wireless applications Latest DDoS techniques--zombies, Blaster, MyDoom All new class of vulnerabilities--HTTP Response Splitting.
1
There are no comments on this title.