Your session will expire automatically in 0 seconds.
LEADER 00000cam a2200265 a 4500
001 u46166
003 SIRSI
008 181010s2014 xxua 001 0 eng d
020 9780840020932
020 0840020937
050 00 TK5105.59 |bB366 2014
100 1 Basta,Alfred
245 10 Computer security and penetration testing /|cAlfred Basta,
Nadine Basta, Mary Brown.
250 2nd ed
260 Stamford, Connecticut :|bCengage Learning, |c2014
300 xix,376 p : |bill;|c23 cm.
504 Includes index.
505 0 Ethics of hacking and cracking -- Reconnaissance --
Scanning tools -- Sniffers -- TCP/IP vulnerabilities --
Encryption and password cracking -- Spoofing -- Session
hijacking -- Hacking network devices -- Trojan horses --
Denial-of-service attacks -- Buffer overflows --
Programming exploits -- Mail vulnerabilities -- Web
application vulnerabilities -- Windows vulnerabilities --
UNIX/Linux vulnerabilities -- Incident handling.
520 Spotlighting the latest threats and vulnerabilities, this
book is packed with real-world examples that showcase
today's most important and relevant security topics. It
addresses how and why people attack computers and networks,
equipping readers with the knowledge and techniques to
successfully combat hackers. Also includes new emphasis on
ethics and legal issues and readers are provided with a
clear differentiation between hacking myths and hacking
facts. Straightforward in its approach, this comprehensive
resource teaches the skills needed to go from hoping a
system is secure to knowing that it is
650 Computer networks |xSecurity measures
700 1 Basta, Nadine
700 1 Brown, Mary