Record ID | marc_loc_2016/BooksAll.2016.part35.utf8:167003125:1554 |
Source | Library of Congress |
Download Link | /show-records/marc_loc_2016/BooksAll.2016.part35.utf8:167003125:1554?format=raw |
LEADER: 01554cam a22003017a 4500
001 2008274882
003 DLC
005 20090113084810.0
008 080721s2008 maua 001 0 eng d
010 $a 2008274882
020 $a1597492574
020 $a9781597492577
035 $a(OCoLC)ocn182656700
040 $aYDXCP$cYDXCP$dBAKER$dBTCTA$dBWX$dUIU$dDLC
042 $alccopycat
050 00 $aTK5105.59$b.N335 2008
082 04 $a005.8$222
245 00 $aNetcat power tools /$cJan Kanclirz Jr., technical editor; Brian Baskin, ... [et al]
260 $aBurlington, MA :$bSyngress Publishing, Inc.,$cc2008
300 $axvi, 260 p. :$bill. ;$c24 cm.
500 $aIncludes index.
520 $aNetcat in one of the most commonly used anti-hacking tools in the world. It reads and writes data across network connections, using the TCP/IP protocol. It is designed to be a reliable "back-end" tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging tool, since it can create almost any kind of connection you would need and has very interesting built-in capabilities. It lends itself to being useful in a myriad of situations. This book offers a comprehensive look at its possibilities.
650 0 $aComputer networks$xSecurity measures.
650 0 $aData protection.
650 0 $aTCP/IP (Computer network protocol)
700 1 $aKanclirz, Jan.
700 1 $aBaskin, Brian.
856 42 $3Publisher description$uhttp://www.loc.gov/catdir/enhancements/fy0902/2008274882-d.html