Network security assessment:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Beijing [u.a.]
O'Reilly
2004
|
Ausgabe: | 1. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XXI, 371 S. |
ISBN: | 059600611X |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV019426705 | ||
003 | DE-604 | ||
005 | 20170222 | ||
007 | t | ||
008 | 041015s2004 |||| 00||| eng d | ||
016 | 7 | |a 969911483 |2 DE-101 | |
020 | |a 059600611X |c Kt. : EUR 38.00 (freier Pr.) |9 0-596-00611-X | ||
024 | 3 | |a 9780596006112 | |
024 | 1 | |a 636920006114 | |
035 | |a (OCoLC)442364843 | ||
035 | |a (DE-599)BVBBV019426705 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
050 | 0 | |a QA76.9.A25 | |
080 | |a 004.7 | ||
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
100 | 1 | |a McNab, Chris |d 1980- |e Verfasser |0 (DE-588)131828967 |4 aut | |
245 | 1 | 0 | |a Network security assessment |c Chris McNab |
250 | |a 1. ed. | ||
264 | 1 | |a Beijing [u.a.] |b O'Reilly |c 2004 | |
300 | |a XXI, 371 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Internet - Server - Computersicherheit - Datensicherung - Leistungsbewertung | |
650 | 4 | |a Rechnernetz - Betriebssystem - Computersicherheit - Datensicherung - Leistungsbewertung | |
650 | 4 | |a Rechnernetz - Computersicherheit - Datensicherung - Leistungsbewertung - Checkliste | |
650 | 4 | |a Rechnernetz - Kommunikationsprotokoll - Computersicherheit - Datensicherung - Leistungsbewertung | |
650 | 4 | |a Computer networks |x Security measures |x Evaluation | |
650 | 4 | |a Computers |x Access control |x Evaluation | |
650 | 0 | 7 | |a Betriebssystem |0 (DE-588)4006216-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Leistungsbewertung |0 (DE-588)4167271-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Server |0 (DE-588)4209324-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4398750-3 |a Checkliste |2 gnd-content | |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 4 | |a Leistungsbewertung |0 (DE-588)4167271-9 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 1 | 1 | |a Betriebssystem |0 (DE-588)4006216-8 |D s |
689 | 1 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | 4 | |a Leistungsbewertung |0 (DE-588)4167271-9 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 2 | 1 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 2 | 2 | |a Leistungsbewertung |0 (DE-588)4167271-9 |D s |
689 | 2 | 3 | |a Server |0 (DE-588)4209324-7 |D s |
689 | 2 | 4 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 2 | 5 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 2 | |8 1\p |5 DE-604 | |
689 | 3 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 3 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 3 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 3 | 3 | |a Leistungsbewertung |0 (DE-588)4167271-9 |D s |
689 | 3 | |5 DE-604 | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=012887835&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-012887835 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804132893852696576 |
---|---|
adam_text | Titel: Network security assessment
Autor: McNab, Chris
Jahr: 2004
Table of Contents
Foreword................................................................ix
Preface ................................................................xiii
1. Network Security Assessment........................................ 1
The Business Benefits 1
IP: The Foundation of the Internet 2
Classifying Internet-Based Attackers 3
Assessment Service Definitions 3
Network Security Assessment Methodology 4
The Cyclic Assessment Approach 7
2. The Tools Required.................................................. 9
The Operating Systems 9
Free Network Scanning Tools 11
Commercial Network Scanning Tools 12
Protocol-Dependent Assessment Tools 13
3. Internet Host and Network Enumeration .............................17
Web Search Engines 17
NIC Querying 21
DNS Querying 25
Enumeration Technique Recap 34
Enumeration Countermeasures 35
4. IP Network Scanning...............................................36
ICMP Probing 36
TCP Port Scanning 42
UDP Port Scanning
IDS Evasion and Filter Circumvention -------- 56
Low-Level IP Assessment ^5
Network Scanning Recap 71
Network Scanning Countermeasures 72
5. Assessing Remote Information Services .............................. 73
Remote Information Services 73
systat and netstat 73
DNS 75
finger 8^
auth 84
SNMP ¦ ¦; ...........85
LDAP 90
rwho 92
RPC rusers 93
Remote Information Services Countermeasures 93
6. Assessing Web Services............................................. 95
Web Services 95
Identifying the Web Service 96
Identifying Subsystems and Components 105
Investigating Web Service Vulnerabilities 111
Accessing Poorly Protected Information 139
Assessing CGI Scripts and Custom ASP Pages 140
Web Services Countermeasures 153
7. Assessing Remote Maintenance Services ............................155
Remote Maintenance Services 155
SSH 156
Telnet 163
R-Services 170
X Windows 174
Microsoft Remote Desktop Protocol 178
VNC 180
Citrix 182
Remote Maintenance Services Countermeasures 185
vi | Table of Contents
8. Assessing FTP and Database Services................................186
FTP 186
FTP Banner Grabbing and Enumeration 187
FTP Brute-Force Password Guessing 191
FTP Bounce Attacks 191
Circumventing Stateful Filters Using FTP 193
FTP Process Manipulation Attacks 196
FTP Services Countermeasures 201
Database Services 202
Microsoft SQL Server 202
Oracle 206
MySQL 212
Database Services Countermeasures 214
9. Assessing Windows Networking Services ............................215
Microsoft Windows Networking Services 215
Microsoft RPC Services 216
The NetBIOS Name Service 230
The NetBIOS Datagram Service 232
The NetBIOS Session Service 233
The CIFS Service 241
Unix Samba Vulnerabilities 244
Windows Networking Services Countermeasures 245
10. Assessing Email Services...........................................247
Email Service Protocols 247
SMTP 247
POP-2 and POP-3 256
IMAP 258
Email Services Countermeasures 260
11. Assessing IP VPN Services..........................................261
IPsecVPNs 261
Attacking IPsec VPNs 263
Check Point VPN Security Issues 268
Microsoft PPTP 271
VPN Services Countermeasures 272
Table of Contents | vii
12. Assessing Unix RPC Services........................................
773
Enumerating Unix RPC Services
RPC Service Vulnerabilities 275
Unix RPC Services Countermeasures 282
13. Application-Level Risks............................................284
The Fundamental Hacking Concept 28^
The Reasons Why Software Is Vulnerable 285
Network Service Vulnerabilities and Attacks 286
Classic Buffer-Overflow Vulnerabilities 2^0
Heap Overflows 301
Integer Overflows 308
Format String Bugs 311
Memory Manipulation Attacks Recap 317
Mitigating Process Manipulation Risks 318
Recommended Secure Development Reading 321
14. Example Assessment Methodology .................................322
Network Scanning 322
Accessible Network Service Identification 328
Investigation of Known Vulnerabilities 334
Network Service Testing 338
Methodology Flow Diagram 343
Recommendations 343
Closing Comments 347
A. TCP, UDP Ports, and ICMP Message Types.............................349
TCP Ports 349
UDP Ports 352
ICMP Message Types 352
B. Sources of Vulnerability Information................................354
Security Mailing Lists 354
Vulnerability Databases and Lists 354
Underground Web Sites 355
Security Events and Conferences 355
Index........................................................................357
viii | Table of Contents
|
any_adam_object | 1 |
author | McNab, Chris 1980- |
author_GND | (DE-588)131828967 |
author_facet | McNab, Chris 1980- |
author_role | aut |
author_sort | McNab, Chris 1980- |
author_variant | c m cm |
building | Verbundindex |
bvnumber | BV019426705 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 200 |
ctrlnum | (OCoLC)442364843 (DE-599)BVBBV019426705 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03608nam a2200853 c 4500</leader><controlfield tag="001">BV019426705</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170222 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">041015s2004 |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">969911483</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">059600611X</subfield><subfield code="c">Kt. : EUR 38.00 (freier Pr.)</subfield><subfield code="9">0-596-00611-X</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9780596006112</subfield></datafield><datafield tag="024" ind1="1" ind2=" "><subfield code="a">636920006114</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)442364843</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV019426705</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="080" ind1=" " ind2=" "><subfield code="a">004.7</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">McNab, Chris</subfield><subfield code="d">1980-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)131828967</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network security assessment</subfield><subfield code="c">Chris McNab</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Beijing [u.a.]</subfield><subfield code="b">O'Reilly</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXI, 371 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet - Server - Computersicherheit - Datensicherung - Leistungsbewertung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Rechnernetz - Betriebssystem - Computersicherheit - Datensicherung - Leistungsbewertung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Rechnernetz - Computersicherheit - Datensicherung - Leistungsbewertung - Checkliste</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Rechnernetz - Kommunikationsprotokoll - Computersicherheit - Datensicherung - Leistungsbewertung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Evaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="x">Evaluation</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Betriebssystem</subfield><subfield code="0">(DE-588)4006216-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Leistungsbewertung</subfield><subfield code="0">(DE-588)4167271-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Server</subfield><subfield code="0">(DE-588)4209324-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4398750-3</subfield><subfield code="a">Checkliste</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Leistungsbewertung</subfield><subfield code="0">(DE-588)4167271-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Betriebssystem</subfield><subfield code="0">(DE-588)4006216-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Leistungsbewertung</subfield><subfield code="0">(DE-588)4167271-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Leistungsbewertung</subfield><subfield code="0">(DE-588)4167271-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="3"><subfield code="a">Server</subfield><subfield code="0">(DE-588)4209324-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="4"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="5"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="3"><subfield code="a">Leistungsbewertung</subfield><subfield code="0">(DE-588)4167271-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=012887835&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-012887835</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | (DE-588)4398750-3 Checkliste gnd-content |
genre_facet | Checkliste |
id | DE-604.BV019426705 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T20:00:04Z |
institution | BVB |
isbn | 059600611X |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-012887835 |
oclc_num | 442364843 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | XXI, 371 S. |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | O'Reilly |
record_format | marc |
spelling | McNab, Chris 1980- Verfasser (DE-588)131828967 aut Network security assessment Chris McNab 1. ed. Beijing [u.a.] O'Reilly 2004 XXI, 371 S. txt rdacontent n rdamedia nc rdacarrier Internet - Server - Computersicherheit - Datensicherung - Leistungsbewertung Rechnernetz - Betriebssystem - Computersicherheit - Datensicherung - Leistungsbewertung Rechnernetz - Computersicherheit - Datensicherung - Leistungsbewertung - Checkliste Rechnernetz - Kommunikationsprotokoll - Computersicherheit - Datensicherung - Leistungsbewertung Computer networks Security measures Evaluation Computers Access control Evaluation Betriebssystem (DE-588)4006216-8 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Leistungsbewertung (DE-588)4167271-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kommunikationsprotokoll (DE-588)4128252-8 gnd rswk-swf Server (DE-588)4209324-7 gnd rswk-swf (DE-588)4398750-3 Checkliste gnd-content Rechnernetz (DE-588)4070085-9 s Kommunikationsprotokoll (DE-588)4128252-8 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Leistungsbewertung (DE-588)4167271-9 s DE-604 Betriebssystem (DE-588)4006216-8 s Server (DE-588)4209324-7 s Internet (DE-588)4308416-3 s 1\p DE-604 HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=012887835&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | McNab, Chris 1980- Network security assessment Internet - Server - Computersicherheit - Datensicherung - Leistungsbewertung Rechnernetz - Betriebssystem - Computersicherheit - Datensicherung - Leistungsbewertung Rechnernetz - Computersicherheit - Datensicherung - Leistungsbewertung - Checkliste Rechnernetz - Kommunikationsprotokoll - Computersicherheit - Datensicherung - Leistungsbewertung Computer networks Security measures Evaluation Computers Access control Evaluation Betriebssystem (DE-588)4006216-8 gnd Rechnernetz (DE-588)4070085-9 gnd Internet (DE-588)4308416-3 gnd Datensicherung (DE-588)4011144-1 gnd Leistungsbewertung (DE-588)4167271-9 gnd Computersicherheit (DE-588)4274324-2 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd Server (DE-588)4209324-7 gnd |
subject_GND | (DE-588)4006216-8 (DE-588)4070085-9 (DE-588)4308416-3 (DE-588)4011144-1 (DE-588)4167271-9 (DE-588)4274324-2 (DE-588)4128252-8 (DE-588)4209324-7 (DE-588)4398750-3 |
title | Network security assessment |
title_auth | Network security assessment |
title_exact_search | Network security assessment |
title_full | Network security assessment Chris McNab |
title_fullStr | Network security assessment Chris McNab |
title_full_unstemmed | Network security assessment Chris McNab |
title_short | Network security assessment |
title_sort | network security assessment |
topic | Internet - Server - Computersicherheit - Datensicherung - Leistungsbewertung Rechnernetz - Betriebssystem - Computersicherheit - Datensicherung - Leistungsbewertung Rechnernetz - Computersicherheit - Datensicherung - Leistungsbewertung - Checkliste Rechnernetz - Kommunikationsprotokoll - Computersicherheit - Datensicherung - Leistungsbewertung Computer networks Security measures Evaluation Computers Access control Evaluation Betriebssystem (DE-588)4006216-8 gnd Rechnernetz (DE-588)4070085-9 gnd Internet (DE-588)4308416-3 gnd Datensicherung (DE-588)4011144-1 gnd Leistungsbewertung (DE-588)4167271-9 gnd Computersicherheit (DE-588)4274324-2 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd Server (DE-588)4209324-7 gnd |
topic_facet | Internet - Server - Computersicherheit - Datensicherung - Leistungsbewertung Rechnernetz - Betriebssystem - Computersicherheit - Datensicherung - Leistungsbewertung Rechnernetz - Computersicherheit - Datensicherung - Leistungsbewertung - Checkliste Rechnernetz - Kommunikationsprotokoll - Computersicherheit - Datensicherung - Leistungsbewertung Computer networks Security measures Evaluation Computers Access control Evaluation Betriebssystem Rechnernetz Internet Datensicherung Leistungsbewertung Computersicherheit Kommunikationsprotokoll Server Checkliste |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=012887835&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT mcnabchris networksecurityassessment |