عرض عادي

Seven deadliest network attacks / Stacy Prowell, Rob Kraus, Mike Borkin.

بواسطة:المساهم (المساهمين):نوع المادة : نصنصالسلاسل:Syngress seven deadliest attacks seriesالناشر:Amsterdam ; Boston : Syngress, [2010]تاريخ حقوق النشر: copyright 2010وصف:xiv, 142 pages : illustrations ; 24 cmنوع المحتوى:
  • text
نوع الوسائط:
  • unmediated
نوع الناقل:
  • volume
تدمك:
  • 9781597495493 (pbk)
  • 1597495492 (pbk)
عنوان آخر:
  • 7 deadliest network attacks
الموضوع:تصنيف مكتبة الكونجرس:
  • TK5105.59 P76 2010
المحتويات:
Introduction -- Chapter 1: Denial of Service -- Chapter 2: War Dialing -- Chapter 3: Penetration "Testing" -- Chapter 4: Protocol Tunneling -- Chapter 5: Spanning Tree Attacks -- Chapter 6: Man-in-the-Middle -- Chapter 7: Password Replay.
الاستعراض: Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree Attacks Man-in-the-Middle Password Replay Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.
المقتنيات
نوع المادة المكتبة الحالية رقم الطلب رقم النسخة حالة تاريخ الإستحقاق الباركود
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة TK5105.59 P76 2010 (إستعراض الرف(يفتح أدناه)) C.1 Library Use Only | داخل المكتبة فقط 30010000146377
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة TK5105.59 P76 2010 (إستعراض الرف(يفتح أدناه)) C.2 المتاح 30010000146379

Includes bibliographical references and index.

Introduction -- Chapter 1: Denial of Service -- Chapter 2: War Dialing -- Chapter 3: Penetration "Testing" -- Chapter 4: Protocol Tunneling -- Chapter 5: Spanning Tree Attacks -- Chapter 6: Man-in-the-Middle -- Chapter 7: Password Replay.

Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree Attacks Man-in-the-Middle Password Replay Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

شارك

أبوظبي، الإمارات العربية المتحدة

reference@ecssr.ae

97124044780 +

حقوق النشر © 2024 مركز الإمارات للدراسات والبحوث الاستراتيجية جميع الحقوق محفوظة