Network Security Hacks:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Beijing [u.a.]
O'Reilly
2004
|
Ausgabe: | 1. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XV, 298 S. |
ISBN: | 0596006438 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV019341579 | ||
003 | DE-604 | ||
005 | 20111118 | ||
007 | t | ||
008 | 040721s2004 |||| 00||| eng d | ||
020 | |a 0596006438 |9 0-596-00643-8 | ||
035 | |a (OCoLC)56386334 | ||
035 | |a (DE-599)BVBBV019341579 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-M158 |a DE-573 |a DE-703 |a DE-1051 |a DE-473 |a DE-634 |a DE-11 |a DE-188 |a DE-91G | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a 28 |2 sdnb | ||
084 | |a DAT 461f |2 stub | ||
100 | 1 | |a Lockhart, Andrew |e Verfasser |4 aut | |
245 | 1 | 0 | |a Network Security Hacks |c Andrew Lockhart |
250 | |a 1. ed. | ||
264 | 1 | |a Beijing [u.a.] |b O'Reilly |c 2004 | |
300 | |a XV, 298 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Internet |x Security measures | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Virtuelles privates Netzwerk |0 (DE-588)4501379-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Betriebssystem |0 (DE-588)4006216-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Eindringerkennung |0 (DE-588)4706627-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 1 | 1 | |a Betriebssystem |0 (DE-588)4006216-8 |D s |
689 | 1 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 2 | 1 | |a Eindringerkennung |0 (DE-588)4706627-1 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 3 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 3 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Virtuelles privates Netzwerk |0 (DE-588)4501379-2 |D s |
689 | 4 | 1 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |D s |
689 | 4 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 4 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 4 | |5 DE-604 | |
856 | 4 | 2 | |m HEBIS Datenaustausch Darmstadt |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=012806078&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-012806078 |
Datensatz im Suchindex
_version_ | 1804132765977804800 |
---|---|
adam_text | NETWORK SECURITY HACKS * ANDREW %PCKHART * JI O REILLY* BEIJING *
CAMBRIDGE * FARNHAM * KOLN * PARIS * SEBASTOPOL * TAIPEI * TOKYO
CONTENTS CREDITS IX PREFACE XI CHAPTER 1. UNIX HOST SECURITY 1 1. SECURE
MOUNT POINTS 2 2. SCAN FOR SUID AND SGID PROGRAMS 3 3. SCAN FOR WORLD-
AND GROUP-WRITABLE DIRECTORIES 5 4. CREATE FLEXIBLE PERMISSIONS
HIERARCHIES WITH POSIX ACLS 5 5. PROTECT YOUR LOGS FROM TAMPERING 8 6.
DELEGATE ADMINISTRATIVE ROLES 10 7. AUTOMATE CRYPTOGRAPHIC SIGNATURE
VERIFICATION 12 8. CHECK FOR LISTENING SERVICES 14 9. PREVENT SERVICES
FROM BINDING TO AN INTERFACE 16 10. RESTRICT SERVICES WITH SANDBOXED
ENVIRONMENTS 18 11. USE PROFTP WITH A MYSQL AUTHENTICATION SOURCE 21 12.
PREVENT STACK-SMASHING ATTACKS 23 13. LOCK DOWN YOUR KERNEL WITH
GRSECURITY 25 14. RESTRICT APPLICATIONS WITH GRSECURITY 30 15. RESTRICT
SYSTEM CALLS WITH SYSTRACE 32 16. AUTOMATED SYSTRACE POLICY CREATION 35
17. CONTROL LOGIN ACCESS WITH PAM 38 18. RESTRICTED SHELL ENVIRONMENTS
42 19. ENFORCE USER AND GROUP RESOURCE LIMITS 44 20. AUTOMATE SYSTEM
UPDATES 45 CHAPTER 2. WINDOWS HOST SECURITY 47 21. CHECK SERVERS FOR
APPLIED PATCHES 47 22. GET A LIST OF OPEN FILES AND THEIR OWNING
PROCESSES 53 23. LIST RUNNING SERVICES AND OPEN PORTS 54 24. ENABLE
AUDITING 55 25. SECURE YOUR EVENT LOGS 56 26. CHANGE YOUR MAXIMUM LOG
FILE SIZES 57 27. DISABLE DEFAULT SHARES 58 28. ENCRYPT YOUR TEMP FOLDER
60 29. CLEAR THE PAGING FILE AT SHUTDOWN 62 30. RESTRICT APPLICATIONS
AVAILABLE TO USERS 63 CHAPTER 3. NETWORK SECURITY 66 31. DETECT ARP
SPOOFING 67 32. CREATE A STATIC ARP TABLE 69 33. FIREWALL WITH NETFILTER
71 34. FIREWALL WITH OPENBSD S PACKETFILTER 75 35. CREATE AN
AUTHENTICATED GATEWAY 80 36. FIREWALL WITH WINDOWS 82 37. KEEP YOUR
NETWORK SELF-CONTAINED 86 38. TEST YOUR FIREWALL 87 39. MAC FILTERING
WITH NETFILTER 90 40. BLOCK OS FINGERPRINTING 91 41. FOOL REMOTE
OPERATING SYSTEM DETECTION SOFTWARE 94 42. KEEP AN INVENTORY OF YOUR
NETWORK 98 43. SCAN YOUR NETWORK FOR VULNERABILITIES 100 44. KEEP SERVER
CLOCKS SYNCHRONIZED 106 45. CREATE YOUR OWN CERTIFICATE AUTHORITY 108
46. DISTRIBUTE YOUR CA TO CLIENTS 111 47. ENCRYPT IMAP AND POP WITH SSL
113 48. SET UP TLS-ENABLED SMTP 115 49. DETECT ETHERNET SNIFFERS
REMOTELY 117 50. INSTALL APACHE WITH SSL AND SUEXEC 121 51. SECURE BIND
125 52. SECURE MYSQL 128 53. SHARE FILES SECURELY IN UNIX 130 VI I
CONTENTS CHAPTER 4. LOGGING 134 54. RUN A CENTRAL SYSLOG SERVER 135 55.
STEER SYSLOG 136 56. INTEGRATE WINDOWS INTO YOUR SYSLOG INFRASTRUCTURE
138 57. AUTOMATICALLY SUMMARIZE YOUR LOGS 144 58. MONITOR YOUR LOGS
AUTOMATICALLY 146 59. AGGREGATE LOGS FROM REMOTE SITES 149 60. LOG USER
ACTIVITY WITH PROCESS ACCOUNTING 154 CHAPTER 5. MONITORING AND TRENDING
156 61. MONITOR AVAILABILITY 157 62. GRAPH TRENDS 164 63. RUN NTOP FOR
REAL-TIME NETWORK STATS 166 64. AUDIT NETWORK TRAFFIC 169 65. COLLECT
STATISTICS WITH FIREWALL RULES 171 66. SNIFF THE ETHER REMOTELY 172
CHAPTER 6. SECURE TUNNELS 176 67. SET UP IPSEC UNDER LINUX 176 68. SET
UP IPSEC UNDER FREEBSD 179 69. SET UP IPSEC IN OPENBSD 182 70. PPTP
TUNNELING 183 71. OPPORTUNISTIC ENCRYPTION WITH FREES/WAN 188 72.
FORWARD AND ENCRYPT TRAFFIC WITH SSH 189 73. QUICK LOGINS WITH SSH
CLIENT KEYS 191 74. SQUID PROXY OVER SSH 193 75. USE SSH AS A SOCKS
PROXY 195 76. ENCRYPT AND TUNNEL TRAFFIC WITH SSL 198 77. TUNNEL
CONNECTIONS INSIDE HTTP 200 78. TUNNEL WITH VTUN AND SSH 202 79.
AUTOMATIC VTUND.CONF GENERATOR 207 80. CREATE A CROSS-PLATFORM VPN 211
81. TUNNEL PPP 216 CHAPTER 7. NETWORK INTRUSION DETECTION 219 82. DETECT
INTRUSIONS WITH SNORT 220 83. KEEP TRACK OF ALERTS 224 CONTENTS I VII
84. REAL-TIME MONITORING 227 85. MANAGE A SENSOR NETWORK 233 86. WRITE
YOUR OWN SNORT RULES 239 87. PREVENT AND CONTAIN INTRUSIONS WITH
SNORT_INLINE 244 88. AUTOMATED DYNAMIC FIREWALLING WITH SNORTSAM 247 89.
DETECT ANOMALOUS BEHAVIOR 250 90. AUTOMATICALLY UPDATE SNORT S RULES 252
91. CREATE A DISTRIBUTED STEALTH SENSOR NETWORK 253 92. USE SNORT IN
HIGH-PERFORMANCE ENVIRONMENTS WITH BARNYARD 254 93. DETECT AND PREVENT
WEB APPLICATION INTRUSIONS 257 94. SIMULATE A NETWORK OF VULNERABLE
HOSTS 261 95. RECORD HONEYPOT ACTIVITY 265 CHAPTER 8. RECOVERY AND
RESPONSE 268 96. IMAGE MOUNTED FILESYSTEMS 268 97. VERIFY FILE INTEGRITY
AND FIND COMPROMISED FILES 270 98. FIND COMPROMISED PACKAGES WITH RPM
274 99. SCAN FOR ROOT KITS 276 100. FIND THE OWNER OF A NETWORK 278
INDEX 281 VIII I CONTENTS
|
any_adam_object | 1 |
author | Lockhart, Andrew |
author_facet | Lockhart, Andrew |
author_role | aut |
author_sort | Lockhart, Andrew |
author_variant | a l al |
building | Verbundindex |
bvnumber | BV019341579 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 277 |
classification_tum | DAT 461f |
ctrlnum | (OCoLC)56386334 (DE-599)BVBBV019341579 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02840nam a2200721 c 4500</leader><controlfield tag="001">BV019341579</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20111118 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">040721s2004 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0596006438</subfield><subfield code="9">0-596-00643-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)56386334</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV019341579</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M158</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">28</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lockhart, Andrew</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network Security Hacks</subfield><subfield code="c">Andrew Lockhart</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Beijing [u.a.]</subfield><subfield code="b">O'Reilly</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XV, 298 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Virtuelles privates Netzwerk</subfield><subfield code="0">(DE-588)4501379-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Betriebssystem</subfield><subfield code="0">(DE-588)4006216-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Betriebssystem</subfield><subfield code="0">(DE-588)4006216-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Virtuelles privates Netzwerk</subfield><subfield code="0">(DE-588)4501379-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="1"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HEBIS Datenaustausch Darmstadt</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=012806078&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-012806078</subfield></datafield></record></collection> |
id | DE-604.BV019341579 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T19:58:02Z |
institution | BVB |
isbn | 0596006438 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-012806078 |
oclc_num | 56386334 |
open_access_boolean | |
owner | DE-M158 DE-573 DE-703 DE-1051 DE-473 DE-BY-UBG DE-634 DE-11 DE-188 DE-91G DE-BY-TUM |
owner_facet | DE-M158 DE-573 DE-703 DE-1051 DE-473 DE-BY-UBG DE-634 DE-11 DE-188 DE-91G DE-BY-TUM |
physical | XV, 298 S. |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | O'Reilly |
record_format | marc |
spelling | Lockhart, Andrew Verfasser aut Network Security Hacks Andrew Lockhart 1. ed. Beijing [u.a.] O'Reilly 2004 XV, 298 S. txt rdacontent n rdamedia nc rdacarrier Computer networks Security measures Computer security Internet Security measures Computersicherheit (DE-588)4274324-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Virtuelles privates Netzwerk (DE-588)4501379-2 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Kommunikationsprotokoll (DE-588)4128252-8 gnd rswk-swf Betriebssystem (DE-588)4006216-8 gnd rswk-swf Eindringerkennung (DE-588)4706627-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s DE-604 Betriebssystem (DE-588)4006216-8 s Eindringerkennung (DE-588)4706627-1 s Internet (DE-588)4308416-3 s Virtuelles privates Netzwerk (DE-588)4501379-2 s Kommunikationsprotokoll (DE-588)4128252-8 s HEBIS Datenaustausch Darmstadt application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=012806078&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Lockhart, Andrew Network Security Hacks Computer networks Security measures Computer security Internet Security measures Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd Virtuelles privates Netzwerk (DE-588)4501379-2 gnd Internet (DE-588)4308416-3 gnd Rechnernetz (DE-588)4070085-9 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd Betriebssystem (DE-588)4006216-8 gnd Eindringerkennung (DE-588)4706627-1 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4011144-1 (DE-588)4501379-2 (DE-588)4308416-3 (DE-588)4070085-9 (DE-588)4128252-8 (DE-588)4006216-8 (DE-588)4706627-1 |
title | Network Security Hacks |
title_auth | Network Security Hacks |
title_exact_search | Network Security Hacks |
title_full | Network Security Hacks Andrew Lockhart |
title_fullStr | Network Security Hacks Andrew Lockhart |
title_full_unstemmed | Network Security Hacks Andrew Lockhart |
title_short | Network Security Hacks |
title_sort | network security hacks |
topic | Computer networks Security measures Computer security Internet Security measures Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd Virtuelles privates Netzwerk (DE-588)4501379-2 gnd Internet (DE-588)4308416-3 gnd Rechnernetz (DE-588)4070085-9 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd Betriebssystem (DE-588)4006216-8 gnd Eindringerkennung (DE-588)4706627-1 gnd |
topic_facet | Computer networks Security measures Computer security Internet Security measures Computersicherheit Datensicherung Virtuelles privates Netzwerk Internet Rechnernetz Kommunikationsprotokoll Betriebssystem Eindringerkennung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=012806078&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT lockhartandrew networksecurityhacks |