Record ID | marc_nuls/NULS_PHC_180925.mrc:166813956:1916 |
Source | marc_nuls |
Download Link | /show-records/marc_nuls/NULS_PHC_180925.mrc:166813956:1916?format=raw |
LEADER: 01916cam 2200361Ia 4500
001 9920147800001661
005 20150423124636.0
008 070608s2007 caua 001 0 eng d
020 $a0596009631
020 $a9780596009632
029 0 $aYDXCP$b2542139
035 $a(CSdNU)u310616-01national_inst
035 $a(OCoLC)141384583
035 $a(OCoLC)141384583
040 $aYDXCP$cYDX$dBAKER$dYDXCP$dOCLCQ$dJRZ$dIXA
049 $aCNUM
050 4 $aTK5105.59$b.S42 2007
092 0 $a005.8$222
245 00 $aSecurity power tools /$cBryan Burns ... [et al.].
250 $a1st ed.
260 $aSebastopol, CA :$bO'Reilly,$cc2007.
300 $axxxii, 822 p. :$bill. ;$c24 cm.
500 $aIncludes index.
505 0 $aPart 1. Legal and ethics. Legal and ethics issues -- Part 2. Reconnaissance. Network scanning -- Vulnerability scanning -- LAN reconnaissance -- Wireless reconnaissance -- Custom packet generation -- Part 3. Penetration. Metasploit -- Wireless penetration -- Exploitation framework applications -- Custom exploitation -- Part 4. Control. Backdoors -- Rootkits -- Part 5. Defense. Proactive defense : firewalls -- Host hardening -- Securing communications -- Email security and anti-spam -- Device security testing -- Part 6. Monitoring. Network capture -- Network monitoring -- Host monitoring -- Part 7. Discovery. Forensics -- Application fuzzing -- Binary reverse engineering.
650 0 $aComputer networks$xSecurity measures.
650 0 $aComputer security.
700 1 $aBurns, Bryan.
938 $aBaker & Taylor$bBKTY$c59.99$d44.99$i0596009631$n0007184603$sactive
938 $aYBP Library Services$bYANK$n2542139
947 $fSOET-TEC$hCIRCSTACKS$p$56.99$q1
949 $aTK 5105.59 .S42 2007$i31786102216824
994 $a92$bCNU
999 $aTK 5105.59 .S42 2007$wLC$c1$i31786102216824$d1/12/2013$e11/3/2012 $lCIRCSTACKS$mNULS$n2$q1$rY$sY$tBOOK$u11/28/2007