It looks like you're offline.
Open Library logo
additional options menu

MARC Record from Library of Congress

Record ID marc_loc_updates/v37.i34.records.utf8:11477205:1603
Source Library of Congress
Download Link /show-records/marc_loc_updates/v37.i34.records.utf8:11477205:1603?format=raw

LEADER: 01603cam a22002897a 4500
001 2008295186
003 DLC
005 20090811090157.0
008 080313s2007 caua b 001 0 eng d
010 $a 2008295186
020 $a0596009631
020 $a9780596009632
035 $a(OCoLC)ocn141384583
040 $aYDXCP$cYDX$dBAKER$dYDXCP$dOCLCQ$dJRZ$dIXA$dDLC
042 $alccopycat
050 00 $aTK5105.59$b.S443 2007
082 04 $a005.8$222
245 00 $aSecurity power tools /$cBryan Burns ... [et al.].
250 $a1st ed.
260 $aSebastopol, CA :$bO'Reilly,$cc2007.
300 $axxxii, 822 p. :$bill. ;$c24 cm.
504 $aIncludes bibliographical references and index.
505 0 $aPart 1. Legal and ethics. Legal and ethics issues -- Part 2. Reconnaissance. Network scanning -- Vulnerability scanning -- LAN reconnaissance -- Wireless reconnaissance -- Custom packet generation -- Part 3. Penetration. Metasploit -- Wireless penetration -- Exploitation framework applications -- Custom exploitation -- Part 4. Control. Backdoors -- Rootkits -- Part 5. Defense. Proactive defense : firewalls -- Host hardening -- Securing communications -- Email security and anti-spam -- Device security testing -- Part 6. Monitoring. Network capture -- Network monitoring -- Host monitoring -- Part 7. Discovery. Forensics -- Application fuzzing -- Binary reverse engineering.
650 0 $aComputer networks$xSecurity measures.
650 0 $aComputer security.
700 1 $aBurns, Bryan.
856 42 $3Publisher description$uhttp://www.loc.gov/catdir/enhancements/fy0915/2008295186-d.html