عرض عادي

Seven deadliest Microsoft attacks / Rob Kraus ... [and others] ; technical editor, Chris Griffin.

المساهم (المساهمين):نوع المادة : نصنصالسلاسل:Syngress seven deadliest attacks seriesالناشر:Amsterdam ; Boston : Syngress/Elsevier, [2010]تاريخ حقوق النشر: copyright 2010وصف:xvi, 149 pages : illustrations ; 24 cmنوع المحتوى:
  • text
نوع الوسائط:
  • unmediated
نوع الناقل:
  • volume
تدمك:
  • 9781597495516 (pbk)
  • 1597495514 (pbk)
عنوان آخر:
  • 7 deadliest Microsoft attacks
الموضوع:تصنيف مكتبة الكونجرس:
  • QA76.76.C68 S48 2010
المحتويات:
Introduction -- Chapter 1:�Windows Operating�System-Password Attacks� -- Chapter 2: Active Directory-Escalation of Privilege -- Chapter 3: SQL Server-Stored Procedure Attacks -- Chapter 4: Exchange Server-Mail Service Attacks -- Chapter 5: Office-Macros and ActiveX -- Chapter 6: Internet Information Services (IIS)-Web Service Attacks -- Chapter 7: SharePoint-Multi-tier Attacks.
ملخص:Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Windows Operating System - Password Attacks Active Directory - Escalation of Privilege SQL Server - Stored Procedure Attacks Exchange Server - Mail Service Attacks Office - Macros and ActiveX Internet Information Services (IIS) - Web Service Attacks SharePoint - Multi-Tier Attacks Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.
المقتنيات
نوع المادة المكتبة الحالية رقم الطلب رقم النسخة حالة تاريخ الإستحقاق الباركود
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة QA76.76.C68 S48 2010 (إستعراض الرف(يفتح أدناه)) C.1 Library Use Only | داخل المكتبة فقط 30010000146380
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة QA76.76.C68 S48 2010 (إستعراض الرف(يفتح أدناه)) C.2 المتاح 30010000146381

Includes bibliographical references and index.

Introduction -- Chapter 1:�Windows Operating�System-Password Attacks� -- Chapter 2: Active Directory-Escalation of Privilege -- Chapter 3: SQL Server-Stored Procedure Attacks -- Chapter 4: Exchange Server-Mail Service Attacks -- Chapter 5: Office-Macros and ActiveX -- Chapter 6: Internet Information Services (IIS)-Web Service Attacks -- Chapter 7: SharePoint-Multi-tier Attacks.

Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Windows Operating System - Password Attacks Active Directory - Escalation of Privilege SQL Server - Stored Procedure Attacks Exchange Server - Mail Service Attacks Office - Macros and ActiveX Internet Information Services (IIS) - Web Service Attacks SharePoint - Multi-Tier Attacks Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

شارك

أبوظبي، الإمارات العربية المتحدة

reference@ecssr.ae

97124044780 +

حقوق النشر © 2024 مركز الإمارات للدراسات والبحوث الاستراتيجية جميع الحقوق محفوظة