Seven deadliest network attacks / Stacy Prowell, Rob Kraus, Mike Borkin.
نوع المادة :![نص](/opac-tmpl/lib/famfamfam/BK.png)
- text
- unmediated
- volume
- 9781597495493 (pbk)
- 1597495492 (pbk)
- 7 deadliest network attacks
- TK5105.59 P76 2010
نوع المادة | المكتبة الحالية | رقم الطلب | رقم النسخة | حالة | تاريخ الإستحقاق | الباركود | |
---|---|---|---|---|---|---|---|
![]() |
UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | TK5105.59 P76 2010 (إستعراض الرف(يفتح أدناه)) | C.1 | Library Use Only | داخل المكتبة فقط | 30010000146377 | ||
![]() |
UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | TK5105.59 P76 2010 (إستعراض الرف(يفتح أدناه)) | C.2 | المتاح | 30010000146379 |
Browsing UAE Federation Library | مكتبة اتحاد الإمارات shelves, Shelving location: General Collection | المجموعات العامة إغلاق مستعرض الرف(يخفي مستعرض الرف)
TK5105.59 .P56 2002 Internet security dictionary / | TK5105.59 .P758 2013 Privacy solutions and security frameworks in information protection / | TK5105.59 .P758 2013 Privacy solutions and security frameworks in information protection / | TK5105.59 P76 2010 Seven deadliest network attacks / | TK5105.59 P76 2010 Seven deadliest network attacks / | TK5105.59 .R5757 2019 Risks and security of internet and systems: 13th Internet Conferences, CRiSIS 2018 Arcachon, France, October 16-18, 2018, Revised Selected Papers / | TK5105.59 .R5757 2019 Risks and security of internet and systems: 13th Internet Conferences, CRiSIS 2018 Arcachon, France, October 16-18, 2018, Revised Selected Papers / |
Includes bibliographical references and index.
Introduction -- Chapter 1: Denial of Service -- Chapter 2: War Dialing -- Chapter 3: Penetration "Testing" -- Chapter 4: Protocol Tunneling -- Chapter 5: Spanning Tree Attacks -- Chapter 6: Man-in-the-Middle -- Chapter 7: Password Replay.
Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree Attacks Man-in-the-Middle Password Replay Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.