|
|
|
|
| LEADER |
01657cam a2200325 a 4500 |
| 001 |
1/41761 |
| 008 |
111025s2009 enka 001 0 eng |
| 020 |
|
|
|a 9780071613743 (pbk.)
|
| 020 |
|
|
|a 0071613749 (pbk.)
|
| 035 |
|
|
|l 44555
|
| 040 |
|
|
|a UKM
|c UKM
|d GR-PeUP
|
| 082 |
0 |
4 |
|a 005.8 McC
|
| 100 |
1 |
|
|a McClure, Stuart.
|
| 245 |
1 |
0 |
|a Hacking exposed 6 :
|b network security secrets & solutions /
|c Stuart McClure, Joel Scambray, George Kurtz.
|
| 246 |
1 |
4 |
|a Hacking 6 exposed.
|
| 246 |
3 |
|
|a Hacking exposed six.
|
| 250 |
|
|
|a 10th anniversary ed.
|
| 260 |
|
|
|a New York :
|b McGraw-Hill,
|c c2009.
|
| 300 |
|
|
|a xxvii, 687 σ. :
|b εικ. ;
|c 23 εκ.
|
| 500 |
|
|
|a Περιέχει ευρετήριο.
|
| 505 |
0 |
|
|a Casing the establishment. Footprinting -- Scanning -- Enumeration -- System hacking. Hacking Windows -- Hacking Unix -- Infrastructure hacking. Remote connectivity and VoIP hacking -- Network devices -- Wireless hacking -- Hacking hardware -- Application and data hacking. Hacking code -- Web hacking -- Hacking the internet user -- Appendices: Ports ; Top 14 security vulnerabilities ; Denial of service (DoS) and distributed denial of service (DDoS) attacks.
|
| 650 |
|
4 |
|a Computer networks
|x Security measures.
|
| 650 |
|
4 |
|a Computer security.
|
| 650 |
|
4 |
|a Data protection.
|
| 700 |
1 |
|
|a Scambray, Joel.
|
| 700 |
1 |
|
|a Kurtz, George.
|
| 852 |
|
|
|a INST
|b UNIPILB
|c MAIN
|e 20111025
|h 005.8 McC
|p 00163741
|q 00163741
|t LOAN
|y 0
|4 2
|
| 852 |
|
|
|a INST
|b UNIPILB
|c MAIN
|e 20111025
|h 005.8 McC
|p 00163742
|q 00163742
|t LOAN
|y 4
|x 20230131
|4 1
|
| 856 |
4 |
|
|d /webopac/covers/02/44555_9780071613743.jpg
|z (pbk.)
|
| 856 |
4 |
|
|d /webopac/covers/02/44555_0071613749.jpg
|z (pbk.)
|