Matches in Library of Congress for { <http://lccn.loc.gov/2008295186> ?p ?o. }
Showing items 1 to 24 of
24
with 100 items per page.
- 2008295186 contributor B11149441.
- 2008295186 created "c2007.".
- 2008295186 date "2007".
- 2008295186 date "c2007.".
- 2008295186 dateCopyrighted "c2007.".
- 2008295186 description "Includes bibliographical references and index.".
- 2008295186 description "Part 1. Legal and ethics. Legal and ethics issues -- Part 2. Reconnaissance. Network scanning -- Vulnerability scanning -- LAN reconnaissance -- Wireless reconnaissance -- Custom packet generation -- Part 3. Penetration. Metasploit -- Wireless penetration -- Exploitation framework applications -- Custom exploitation -- Part 4. Control. Backdoors -- Rootkits -- Part 5. Defense. Proactive defense : firewalls -- Host hardening -- Securing communications -- Email security and anti-spam -- Device security testing -- Part 6. Monitoring. Network capture -- Network monitoring -- Host monitoring -- Part 7. Discovery. Forensics -- Application fuzzing -- Binary reverse engineering.".
- 2008295186 extent "xxxii, 822 p. :".
- 2008295186 identifier "0596009631".
- 2008295186 identifier "9780596009632".
- 2008295186 identifier 2008295186-d.html.
- 2008295186 identifier 2008295186-b.html.
- 2008295186 identifier 2008295186-t.html.
- 2008295186 issued "2007".
- 2008295186 issued "c2007.".
- 2008295186 language "eng".
- 2008295186 publisher "Sebastopol, CA : O'Reilly,".
- 2008295186 subject "005.8 22".
- 2008295186 subject "Computer networks Security measures.".
- 2008295186 subject "Computer security.".
- 2008295186 subject "TK5105.59 .S443 2007".
- 2008295186 tableOfContents "Part 1. Legal and ethics. Legal and ethics issues -- Part 2. Reconnaissance. Network scanning -- Vulnerability scanning -- LAN reconnaissance -- Wireless reconnaissance -- Custom packet generation -- Part 3. Penetration. Metasploit -- Wireless penetration -- Exploitation framework applications -- Custom exploitation -- Part 4. Control. Backdoors -- Rootkits -- Part 5. Defense. Proactive defense : firewalls -- Host hardening -- Securing communications -- Email security and anti-spam -- Device security testing -- Part 6. Monitoring. Network capture -- Network monitoring -- Host monitoring -- Part 7. Discovery. Forensics -- Application fuzzing -- Binary reverse engineering.".
- 2008295186 title "Security power tools / Bryan Burns ... [et al.].".
- 2008295186 type "text".