Hacking exposed: network security secrets & solutions
This book is updated to include new attacks and countermeasures based on the most recent hacking exploits. It contains brand new coverage of Web services security, and includes expanded coverage of network devices and wireless security--plus additional firewalls content.
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York
Osborne/McGraw-Hill
2003
|
Ausgabe: | 4. ed. |
Schlagworte: | |
Zusammenfassung: | This book is updated to include new attacks and countermeasures based on the most recent hacking exploits. It contains brand new coverage of Web services security, and includes expanded coverage of network devices and wireless security--plus additional firewalls content. |
Beschreibung: | XXIV, 737 S. |
ISBN: | 0072227427 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV016543456 | ||
003 | DE-604 | ||
005 | 20030408 | ||
007 | t | ||
008 | 030226s2003 xxu |||| 00||| eng d | ||
020 | |a 0072227427 |9 0-07-222742-7 | ||
035 | |a (OCoLC)300206529 | ||
035 | |a (DE-599)BVBBV016543456 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-355 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 21 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a McClure, Stuart |e Verfasser |0 (DE-588)121792064 |4 aut | |
245 | 1 | 0 | |a Hacking exposed |b network security secrets & solutions |c Stuart McClure ; Joel Scambray ; George Kurtz |
250 | |a 4. ed. | ||
264 | 1 | |a New York |b Osborne/McGraw-Hill |c 2003 | |
300 | |a XXIV, 737 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
520 | 3 | |a This book is updated to include new attacks and countermeasures based on the most recent hacking exploits. It contains brand new coverage of Web services security, and includes expanded coverage of network devices and wireless security--plus additional firewalls content. | |
650 | 4 | |a Protection de l'information (Informatique) | |
650 | 4 | |a Réseaux d'ordinateurs - Sécurité - Mesures | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Data protection | |
650 | 0 | 7 | |a Hacker |0 (DE-588)4113821-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Betriebssystem |0 (DE-588)4006216-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
655 | 4 | |a Matériel didactique | |
689 | 0 | 0 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Betriebssystem |0 (DE-588)4006216-8 |D s |
689 | 2 | 1 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 2 | |8 1\p |5 DE-604 | |
689 | 3 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 3 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 3 | |8 2\p |5 DE-604 | |
689 | 4 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 4 | 1 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 4 | |8 3\p |5 DE-604 | |
689 | 5 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 5 | |5 DE-604 | |
689 | 6 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 6 | |5 DE-604 | |
700 | 1 | |a Scambray, Joel |e Sonstige |4 oth | |
700 | 1 | |a Kurtz, George |e Sonstige |4 oth | |
999 | |a oai:aleph.bib-bvb.de:BVB01-010222995 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804129854932647936 |
---|---|
any_adam_object | |
author | McClure, Stuart |
author_GND | (DE-588)121792064 |
author_facet | McClure, Stuart |
author_role | aut |
author_sort | McClure, Stuart |
author_variant | s m sm |
building | Verbundindex |
bvnumber | BV016543456 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)300206529 (DE-599)BVBBV016543456 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 4. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02917nam a2200733 c 4500</leader><controlfield tag="001">BV016543456</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20030408 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">030226s2003 xxu |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0072227427</subfield><subfield code="9">0-07-222742-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)300206529</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV016543456</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">McClure, Stuart</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)121792064</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacking exposed</subfield><subfield code="b">network security secrets & solutions</subfield><subfield code="c">Stuart McClure ; Joel Scambray ; George Kurtz</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">4. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York</subfield><subfield code="b">Osborne/McGraw-Hill</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIV, 737 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">This book is updated to include new attacks and countermeasures based on the most recent hacking exploits. It contains brand new coverage of Web services security, and includes expanded coverage of network devices and wireless security--plus additional firewalls content.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs - Sécurité - Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Betriebssystem</subfield><subfield code="0">(DE-588)4006216-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Matériel didactique</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Betriebssystem</subfield><subfield code="0">(DE-588)4006216-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="1"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="5" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="6" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="6" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Scambray, Joel</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kurtz, George</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-010222995</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | Matériel didactique |
genre_facet | Matériel didactique |
id | DE-604.BV016543456 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T19:11:46Z |
institution | BVB |
isbn | 0072227427 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-010222995 |
oclc_num | 300206529 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | XXIV, 737 S. |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Osborne/McGraw-Hill |
record_format | marc |
spelling | McClure, Stuart Verfasser (DE-588)121792064 aut Hacking exposed network security secrets & solutions Stuart McClure ; Joel Scambray ; George Kurtz 4. ed. New York Osborne/McGraw-Hill 2003 XXIV, 737 S. txt rdacontent n rdamedia nc rdacarrier This book is updated to include new attacks and countermeasures based on the most recent hacking exploits. It contains brand new coverage of Web services security, and includes expanded coverage of network devices and wireless security--plus additional firewalls content. Protection de l'information (Informatique) Réseaux d'ordinateurs - Sécurité - Mesures Computer networks Security measures Data protection Hacker (DE-588)4113821-1 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Betriebssystem (DE-588)4006216-8 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Matériel didactique Zugriffskontrolle (DE-588)4293034-0 s DE-604 Datensicherung (DE-588)4011144-1 s Betriebssystem (DE-588)4006216-8 s Hacker (DE-588)4113821-1 s 1\p DE-604 Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s 2\p DE-604 Internet (DE-588)4308416-3 s 3\p DE-604 Scambray, Joel Sonstige oth Kurtz, George Sonstige oth 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | McClure, Stuart Hacking exposed network security secrets & solutions Protection de l'information (Informatique) Réseaux d'ordinateurs - Sécurité - Mesures Computer networks Security measures Data protection Hacker (DE-588)4113821-1 gnd Datensicherung (DE-588)4011144-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Internet (DE-588)4308416-3 gnd Betriebssystem (DE-588)4006216-8 gnd Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4113821-1 (DE-588)4011144-1 (DE-588)4293034-0 (DE-588)4308416-3 (DE-588)4006216-8 (DE-588)4274324-2 (DE-588)4070085-9 |
title | Hacking exposed network security secrets & solutions |
title_auth | Hacking exposed network security secrets & solutions |
title_exact_search | Hacking exposed network security secrets & solutions |
title_full | Hacking exposed network security secrets & solutions Stuart McClure ; Joel Scambray ; George Kurtz |
title_fullStr | Hacking exposed network security secrets & solutions Stuart McClure ; Joel Scambray ; George Kurtz |
title_full_unstemmed | Hacking exposed network security secrets & solutions Stuart McClure ; Joel Scambray ; George Kurtz |
title_short | Hacking exposed |
title_sort | hacking exposed network security secrets solutions |
title_sub | network security secrets & solutions |
topic | Protection de l'information (Informatique) Réseaux d'ordinateurs - Sécurité - Mesures Computer networks Security measures Data protection Hacker (DE-588)4113821-1 gnd Datensicherung (DE-588)4011144-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Internet (DE-588)4308416-3 gnd Betriebssystem (DE-588)4006216-8 gnd Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | Protection de l'information (Informatique) Réseaux d'ordinateurs - Sécurité - Mesures Computer networks Security measures Data protection Hacker Datensicherung Zugriffskontrolle Internet Betriebssystem Computersicherheit Rechnernetz Matériel didactique |
work_keys_str_mv | AT mcclurestuart hackingexposednetworksecuritysecretssolutions AT scambrayjoel hackingexposednetworksecuritysecretssolutions AT kurtzgeorge hackingexposednetworksecuritysecretssolutions |