Computer security and penetration testing / Alfred Basta and Wolf Halton.
Publisher: Boston : Thomson 2008Description: xvii, 414 pISBN: 978-1-4180-4826-6Subject(s): Computer networksDDC classification: 005.8,BAS
Contents:
Ethics Of Hacking And Cracking (Page-1), Reconnaissance (Page-17), Scanning Tools (Page-45), Sniffers (Page-67), TCP/IP Vulnerabilities (Page-99), Encryption And Password Cracking (Page-121), Spoofing (Page-151), Session Hijacking (Page-171), Hacking Network Devices (Page-191), Trojan Horses (Page-217), Denial Of Service Attacks (Page-237), Buffer Overflows (Page-261), Programming Exploits (Page-277), Mail Vulnerabilities (Page-295), Web Application Vulnerabilities (Page-319), Windows Vulnerabilities (Page-341), Linux Vulnerabilities (Page-353), Incident Handling (Page-367).
| Item type | Current location | Home library | Shelving location | Call number | URL | Status | Notes | Date due | Barcode | Item holds |
|---|---|---|---|---|---|---|---|---|---|---|
Book
|
Military College of Signals (MCS) | Military College of Signals (MCS) | General Stacks | 005.8,BAS (Browse shelf) | Link to resource | Available | Almirah No.8, Shelf No.6 | MCS37058 | ||
Book
|
Military College of Signals (MCS) | Military College of Signals (MCS) | General Stacks | 005.8,BAS (Browse shelf) | Link to resource | Available | Almirah No.8, Shelf No.6 | MCS37059 | ||
Book
|
Military College of Signals (MCS) | Military College of Signals (MCS) | 005.8,BAS (Browse shelf) | Link to resource | Available | Almirah No.8, Shelf No.6 | MCS37060 |
Total holds: 0
Ethics Of Hacking And Cracking (Page-1), Reconnaissance (Page-17), Scanning Tools (Page-45), Sniffers (Page-67), TCP/IP Vulnerabilities (Page-99), Encryption And Password Cracking (Page-121), Spoofing (Page-151), Session Hijacking (Page-171), Hacking Network Devices (Page-191), Trojan Horses (Page-217), Denial Of Service Attacks (Page-237), Buffer Overflows (Page-261), Programming Exploits (Page-277), Mail Vulnerabilities (Page-295), Web Application Vulnerabilities (Page-319), Windows Vulnerabilities (Page-341), Linux Vulnerabilities (Page-353), Incident Handling (Page-367).

Book
There are no comments on this title.