|
|
|
|
LEADER |
02528cam a2200553 4500 |
001 |
PPN137954972 |
003 |
http://www.sudoc.fr/137954972 |
005 |
20230710130400.0 |
010 |
|
|
|a 0-13-148104-5
|b br.
|
010 |
|
|
|a 978-0-13-148104-6
|b br.
|
020 |
|
|
|a US
|b 2005027164
|
020 |
|
|
|a GB
|b A572845
|
035 |
|
|
|a (OCoLC)718468200
|
035 |
|
|
|a ocm61694770
|
035 |
|
|
|z ocm65464983
|
100 |
|
|
|a 20091117d2006 m y0frey0103 ba
|
101 |
0 |
|
|a eng
|2 639-2
|
102 |
|
|
|a US
|
105 |
|
|
|a a ||||001|y
|
106 |
|
|
|a r
|
181 |
|
|
|6 z01
|c txt
|2 rdacontent
|
181 |
|
1 |
|6 z01
|a i#
|b xxxe##
|
182 |
|
|
|6 z01
|c n
|2 rdamedia
|
182 |
|
1 |
|6 z01
|a n
|
200 |
1 |
|
|a Counter hack reloaded
|e a step-by-step guide to computer attacks and effective defenses
|f Ed Skoudis with Tom Liston
|
205 |
|
|
|a 2nd edition
|
210 |
|
|
|a Upper Saddle River, NJ
|c Prentice Hall Professional Technical Reference
|d cop. 2006
|
215 |
|
|
|a 1 vol. (XXXII-748 p.)
|c ill., couv. ill. en coul.
|d 24 cm
|
225 |
2 |
|
|a Radia Perlman series in computer networking and security
|
301 |
|
|
|a YDXCP
|
301 |
|
|
|a AU@
|
301 |
|
|
|a NZ1
|
320 |
|
|
|a Notes bibliogr. Index
|
327 |
0 |
|
|a Introduction
|a Networking overview: pretty much everything you need to know about networking to follow the rest of this book
|a Linux and UNIX overview: pretty much everything you need to know about Linux and UNIX to follow the rest of this book
|a Windows NT/2000/XP/2003 overview: pretty much everything you need to know about windows to follow the rest of this book
|a Phase 1: reconnaissance
|a Phase 2: scanning
|a Phase 3: gaining access using application and operating system attacks
|a Phase 3: gaining access using network attacks
|a Phase 3: denial-of-service attacks
|a Phase 4: maintaining access: trojans, backdoors, and rootkits...Oh my!
|a Phase 5: covering tracks and hiding
|a Putting it all together: anatomy of an attack
|a The future, references, and conclusions
|
410 |
|
| |
|t Radia Perlman series in computer networking and security
|
517 |
| |
|
|a Counter hack
|
606 |
|
|
|3 PPN034488448
|a Réseaux d'ordinateurs
|x Mesures de sûreté
|2 rameau
|
606 |
|
|
|3 PPN040813215
|a Sécurité informatique
|2 rameau
|
676 |
|
|
|a 005.8
|v 22
|
680 |
|
|
|a TK5105.59
|b .S57 2006
|
702 |
|
1 |
|3 PPN107748096
|a Skoudis
|b Ed
|f 19..-....
|4 070
|
702 |
|
1 |
|a Liston
|b Tom
|4 070
|
801 |
|
1 |
|a US
|b OCLC
|g AACR2
|
801 |
|
2 |
|a FR
|b AUROC
|g AFNOR
|
801 |
|
3 |
|a FR
|b Abes
|c 20200225
|g AFNOR
|
801 |
|
0 |
|b DLC
|g AACR2
|
801 |
|
2 |
|b YDX
|g AACR2
|
930 |
|
|
|5 441092104:404655475
|b 441092104
|j u
|
998 |
|
|
|a 581326
|