| 000 | 01254 a2200205 4500 | ||
|---|---|---|---|
| 003 | Nust | ||
| 005 | 20231205091303.0 | ||
| 010 | _a 2010922642 | ||
| 020 | _a9781435486096 | ||
| 040 | _cNust | ||
| 082 | _a005.38,SIM | ||
| 100 | 1 |
_aMichael, T Simpson, Kent Backman, James E. Corley _9119455 |
|
| 245 | 1 | 0 |
_aHands-on ethical hacking and network defense / _cMichael T Simpson, Kent Backman, James E. Corley |
| 250 | _a2nd Ed. | ||
| 260 |
_aBoston, MA : _bCourse Technology, _c2010. |
||
| 300 | _ap. cm. | ||
| 505 | _aChapter 1 Ethical Hacking Overview (Page-1), Chapter 2 TCP/IP Concepts Review (Page-23), Chapter 3 Network and Computer Attacks (Page-51), Chapter 4 Footprinting and Social Engineering (Page-77), Chapter 5 Port Scanning (Page-109),Chapter 6 Enumeration (Page-131), Chapter 7 Programming for Security Professionals (Page-165), Chapter 8 Desktop and Server OS Vulnerabilities (Page-203), Chapter 9 Embedded Operating Systems: The Hidden Threat (Page-239), Chapter 10 Hacking Web Servers (Page-263), Chapter 11 Hacking Wireless Networks (Page-303), Chapter 12 Cryptography (Page-333), Chapter 13 Network Protection Systems (Page-371), Legal Resources (Page-401). | ||
| 651 |
_a(Include CD) _98953 |
||
| 942 |
_2ddc _cBK _k005.38,SIM |
||
| 999 |
_c188908 _d188908 |
||