Hacking exposed: network security secrets & solutions
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Berkeley [u.a.]
Osborne/McGraw-Hill
2001
|
Ausgabe: | 2. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Frühere und spätere Aufl. u.d.T.: McClure, Stuart: Hacking exposed |
Beschreibung: | XXIX, 703 S. Ill., graph. Darst. |
ISBN: | 0072127481 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV021613594 | ||
003 | DE-604 | ||
005 | 20060620 | ||
007 | t | ||
008 | 060609s2001 ad|| |||| 00||| eng d | ||
020 | |a 0072127481 |9 0-07-212748-1 | ||
035 | |a (OCoLC)247886115 | ||
035 | |a (DE-599)BVBBV021613594 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-29T |a DE-634 | ||
082 | 0 | |a 005.8 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a DAT 050f |2 stub | ||
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 250f |2 stub | ||
100 | 1 | |a Scambray, Joel |e Verfasser |4 aut | |
245 | 1 | 0 | |a Hacking exposed |b network security secrets & solutions |c Joel Scambray ; Stuart McClure ; George Kurtz |
250 | |a 2. ed. | ||
264 | 1 | |a Berkeley [u.a.] |b Osborne/McGraw-Hill |c 2001 | |
300 | |a XXIX, 703 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Frühere und spätere Aufl. u.d.T.: McClure, Stuart: Hacking exposed | ||
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Betriebssystem |0 (DE-588)4006216-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hacker |0 (DE-588)4113821-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Betriebssystem |0 (DE-588)4006216-8 |D s |
689 | 1 | 1 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
689 | 2 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 2 | 1 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 2 | |8 2\p |5 DE-604 | |
689 | 3 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 3 | |8 3\p |5 DE-604 | |
689 | 4 | 0 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 4 | |8 4\p |5 DE-604 | |
700 | 1 | |a McClure, Stuart |e Verfasser |0 (DE-588)121792064 |4 aut | |
700 | 1 | |a Kurtz, George |e Verfasser |4 aut | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014828763&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-014828763 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 4\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804135400896200704 |
---|---|
adam_text | Titel: Hacking exposed
Autor: Scambray, Joel
Jahr: 2001
CONTENTS
Foreword..................................................................xvii
Acknowledgments ......................................................xxi
Introduction................................................................xxiii
sum
Casing the Establishment
Case Study: Target Acquisition ........................................2
? 1 Footprinting....................................................................5
What Is Footprinting? ..................................................6
Why Is Footprinting Necessary? ................................6
Internet Footprinting....................................................6
Step 1. Determine the Scope of Your Activities................8
Step 2. Network Enumeration....................................13
Step 3. DNS Interrogation........................................22
Step 4. Network Reconnaissance ................................27
Summary..................................................................31
ix
X Hacking Exposed: Network Security Secrets and Solutions
? 2 Scanning ......................................................................33
Scan Types..........................................................^
Identifying TCP and UDP Services Running ..................46
Windows-Based Port Scanners ..................................51
Port Scanning Breakdown........................................57
Active Stack Fingerprinting......................................61
Passive Stack Fingerprinting ....................................65
The Whole Enchilada: Automated Discovery Tools..................67
Summary..................................................................68
? 3 Enumeration ..................................................................71
Windows NT/2000 Enumeration......................................72
NT/2000 Network Resource Enumeration ....................76
NT/2000 User and Group Enumeration........................87
NT/2000 Applications and Banner Enumeration..............95
Let Your Scripts Do the Walking ................................99
Novell Enumeration ....................................................^00
Browsing the Network Neighborhood..........................100
UNIX Enumeration......................................................106
Summary..................................................................113
System Hacking
Case Study: Know Your Enemy........................................116
? 4 Hacking Windows 95/98 and ME..............................................117
Win 9x Remote Exploits ................................................118
Direct Connection to Win 9x Shared Resources................119
Win 9x Backdoor Servers and Trojans ..........................124
Known Server Application Vulnerabilities ....................129
Win 9x Denial of Service..........................................130
Win 9x Local Exploits....................................................130
Windows Millennium Edition (ME) ..................................137
Summary..................................................................138
? 5 Hacking Windows NT........................................................141
Overview..........................................243
Where We re Headed ............................................143
What About Windows 2000? ....................................143
Contents
XI
The Quest for Administrator............................................144
Remote Exploits: Denial of Service and Buffer Overflows . . 160
Privilege Escalation................................................164
Consolidation of Power ................................................174
Exploiting Trust....................................................185
Sniffers..............................................................190
Remote Control and Back Doors ................................194
Port Redirection....................................................203
General Countermeasures to Privileged Compromise .... 207
Rootkit: The Ultimate Compromise....................................211
Covering Tracks..........................................................214
Disabling Auditing................................................214
Clearing the Event Log............................................214
Hiding Files........................................................215
Summary..................................................................216
T 6 Hacking Windows 2000 ........................................................219
Footprinting..............................................................221
Scanning..................................................................221
Enumeration..............................................................226
Penetration................................................................229
NetBIOS-SMB Password Guessing..............................229
Eavesdropping on Password Hashes............................229
Attacks Against IIS 5..............................................229
Remote Buffer Overflows ........................................233
Denial of Service ........................................................233
Privilege Escalation......................................................238
Pilfering ............................................................241
Grabbing the Win 2000 Password Hashes......................241
The Encrypting File System (EFS)................................246
Exploiting Trust....................................................249
Covering Tracks..........................................................251
Disabling Auditing................................................251
Clearing the Event Log............................................252
Hiding Files........................................................252
Back Doors................................................................252
Startup Manipulation ............................................252
Remote Control....................................................255
Keystroke Loggers ................................................257
General Countermeasures: New Windows Security Tools..........257
Group Policy ......................................................257
runas................................................................260
Summary..................................................................261
xii
Hacking Exposed: Network Security Secrets and Solutions
? 7 Novell NetWare Hacking ......................................................265
Attaching but Not Touching............................................267
Enumerate Bindery and Trees..........................................268
Opening the Unlocked Doors ..........................................275
Authenticated Enumeration............................................277
Gaining Admin ..........................................................282
Application Vulnerabilities ............................................285
Spoofing Attacks (Pandora) ............................................287
Once You Have Admin on a Server...............................290
Owning the NDS Files ..................................................292
Log Doctoring............................................................29®
Console Logs ......................................................299
Further Resources........................................................302
Web Sites
(ftp://ftp.novell.com/pub/updates/nw/nw411/) .... 302
Usenet Groups ....................................................303
Summary..................................................................303
? 8 Hacking UNIX...........7 .........................................305
The Quest for Root ......................................................306
A Brief Review ....................................................306
Vulnerability Mapping............................................307
Remote Access Versus Local Access ..................................307
Remote Access............................................................308
Data Driven Attacks ..............................................312
I Want My Shell....................................................317
Common Types of Remote Attacks..............................322
Local Access..............................................................339
After Hacking Root......................................................357
Trojans..............................................................358
Rootkit Recovery..................................................369
Summary..................................................................370
mm
Network Hacking
Case Study: Sweat the Small Stuff! ....................................374
? 9 Dial-Up, PBX, Voicemail, and VPN Hacking ..................................377
Wardialing..............................^80
Hardware ..............................ggg
Legal Issues ............................001
Peripheral Costs...........................................,0-
Contents
Software............................................................382
A Final Note........................................................403
PBX Hacking..............................................................405
Virtual Private Network (VPN) Hacking..............................415
Summary..................................................................419
? 10 Network Devices ..............................................................421
Discovery ................................................................422
Detection............................................................422
SNMP ..............................................................429
Back Doors................................................................433
Default Accounts..................................................433
Lower the Gates (Vulnerabilities)................................437
Shared Versus Switched ................................................443
Detecting the Media You re On..................................444
Passwords on a Silver Platter: Dsniff............................445
Sniffing on a Network Switch....................................448
snmpsniff ..........................................................452
Summary..................................................................457
? 11 Firewalls ......................................................................459
Firewall Landscape......................................................460
Firewall Identification ..................................................460
Advanced Firewall Discovery....................................465
Scanning Through Firewalls............................................469
Packet Filtering ..........................................................473
Application Proxy Vulnerabilities......................................477
WinGate Vulnerabilities..........................................479
Summary..................................................................481
? 12 Denial of Service (DoS) Attacks ..............................................483
Motivation of DoS Attackers............................................484
Types of DoS Attacks....................................................485
Bandwidth Consumption ........................................485
Resource Starvation ..............................................486
Programming Flaws ..............................................486
Routing and DNS Attacks........................................487
Generic DoS Attacks ....................................................488
Sites Under Attack ................................................491
UNIX and Windows NT DoS ..........................................494
Remote DoS Attacks ..............................................495
Distributed Denial of Service Attacks ..........................499
Local DoS Attacks ................................................504
Summary..................................................................506
XiV Hacking Exposed: Network Security Secrets and Solutions
Software Hacking
Case Study: Using All the Dirty Tricks to Get In ....................508
? 13 Remote Control Insecurities ..................................................511
Discovering Remote Control Software................................512
Connecting................................................................513
Weaknesses ..............................................................514
Revealed Passwords ..............................................516
Uploading Profiles ................................................517
What Software Package Is the Best in Terms of Security? ..........521
pcAnywhere........................................................521
ReachOut ..........................................................521
Remotely Anywhere..............................................521
Remotely Possible/ControlIT....................................523
Timbuktu ..........................................................523
Virtual Network Computing (VNC) ............................523
Citrix................................................................526
Summary..................................................................527
? 14 Advanced Techniques ........................................................529
Session Hijacking........................................................530
Back Doors................................................................533
Trojans ....................................................................555
Subverting the System Environment: Rootkits and
Imaging Tools ........................................................558
Social Engineering ......................................................561
Summary..................................................................563
? 15 Web Hacking ..................................................................565
Web Pilfering ............................................................566
Finding Weil-Known Vulnerabilities..................................570
Automated Scripts, for All Those Script Kiddies ............570
Automated Applications..........................................572
Script Inadequacies: Input Validation Attacks........................573
Active Server Pages (ASP) Vulnerabilities......................582
Buffer Overflows ..........................................con
Poor Web Design ... ....................KQQ
c 0 ..............................................jVo
..................................................................600
Contents
T 16 Hacking the Internet User......................................................601
Malicious Mobile Code..........................................603
Microsoft ActiveX ................................................603
Java Security Holes................................................614
Beware the Cookie Monster......................................618
Internet Explorer HTML Frame Vulnerabilities................621
SSL Fraud ................................................................623
Email Hacking............................................................626
Mail Hacking 101.........................................626
Executing Arbitrary Code Through Email......................629
Outlook Address Book Worms ..................................637
File Attachment Attacks...........................639
IRC Hacking..............................................................647
Napster Hacking with Wrapster ......................................649
Global Countermeasures to Internet User Hacking..................650
Keep Antivirus Signatures Updated ............................650
Guarding the Gateways ..........................................651
Summary..................................................................652
Appendixes
TA Ports ..........................................................................657
TB Top 14 Security Vulnerabilities ................................................661
? C About the Companion Web Site ..............................................663
Novell ....................................................................664
UNIX......................................................................665
Windows NT ............................................................665
Wordlists and Dictionaries..............................................666
Wardialing................................................................666
Enumeration Scripts ....................................................666
T Index ..........................................................................667
|
adam_txt |
Titel: Hacking exposed
Autor: Scambray, Joel
Jahr: 2001
CONTENTS
Foreword.xvii
Acknowledgments .xxi
Introduction.xxiii
sum
Casing the Establishment
Case Study: Target Acquisition .2
? 1 Footprinting.5
What Is Footprinting? .6
Why Is Footprinting Necessary? .6
Internet Footprinting.6
Step 1. Determine the Scope of Your Activities.8
Step 2. Network Enumeration.13
Step 3. DNS Interrogation.22
Step 4. Network Reconnaissance .27
Summary.31
ix
X Hacking Exposed: Network Security Secrets and Solutions
? 2 Scanning .33
Scan Types.^
Identifying TCP and UDP Services Running .46
Windows-Based Port Scanners .51
Port Scanning Breakdown.57
Active Stack Fingerprinting.61
Passive Stack Fingerprinting .65
The Whole Enchilada: Automated Discovery Tools.67
Summary.68
? 3 Enumeration .71
Windows NT/2000 Enumeration.72
NT/2000 Network Resource Enumeration .76
NT/2000 User and Group Enumeration.87
NT/2000 Applications and Banner Enumeration.95
Let Your Scripts Do the Walking .99
Novell Enumeration .^00
Browsing the Network Neighborhood.100
UNIX Enumeration.106
Summary.113
System Hacking
Case Study: Know Your Enemy.116
? 4 Hacking Windows 95/98 and ME.117
Win 9x Remote Exploits .118
Direct Connection to Win 9x Shared Resources.119
Win 9x Backdoor Servers and Trojans .124
Known Server Application Vulnerabilities .129
Win 9x Denial of Service.130
Win 9x Local Exploits.130
Windows Millennium Edition (ME) .137
Summary.138
? 5 Hacking Windows NT.141
Overview.243
Where We're Headed .143
What About Windows 2000? .143
Contents
XI
The Quest for Administrator.144
Remote Exploits: Denial of Service and Buffer Overflows . . 160
Privilege Escalation.164
Consolidation of Power .174
Exploiting Trust.185
Sniffers.190
Remote Control and Back Doors .194
Port Redirection.203
General Countermeasures to Privileged Compromise . 207
Rootkit: The Ultimate Compromise.211
Covering Tracks.214
Disabling Auditing.214
Clearing the Event Log.214
Hiding Files.215
Summary.216
T 6 Hacking Windows 2000 .219
Footprinting.221
Scanning.221
Enumeration.226
Penetration.229
NetBIOS-SMB Password Guessing.229
Eavesdropping on Password Hashes.229
Attacks Against IIS 5.229
Remote Buffer Overflows .233
Denial of Service .233
Privilege Escalation.238
Pilfering .241
Grabbing the Win 2000 Password Hashes.241
The Encrypting File System (EFS).246
Exploiting Trust.249
Covering Tracks.251
Disabling Auditing.251
Clearing the Event Log.252
Hiding Files.252
Back Doors.252
Startup Manipulation .252
Remote Control.255
Keystroke Loggers .257
General Countermeasures: New Windows Security Tools.257
Group Policy .257
runas.260
Summary.261
xii
Hacking Exposed: Network Security Secrets and Solutions
? 7 Novell NetWare Hacking .265
Attaching but Not Touching.267
Enumerate Bindery and Trees.268
Opening the Unlocked Doors .275
Authenticated Enumeration.277
Gaining Admin .282
Application Vulnerabilities .285
Spoofing Attacks (Pandora) .287
Once You Have Admin on a Server.290
Owning the NDS Files .292
Log Doctoring.29®
Console Logs .299
Further Resources.302
Web Sites
(ftp://ftp.novell.com/pub/updates/nw/nw411/) . 302
Usenet Groups .303
Summary.303
? 8 Hacking UNIX.7 .305
The Quest for Root .306
A Brief Review .306
Vulnerability Mapping.307
Remote Access Versus Local Access .307
Remote Access.308
Data Driven Attacks .312
I Want My Shell.317
Common Types of Remote Attacks.322
Local Access.339
After Hacking Root.357
Trojans.358
Rootkit Recovery.369
Summary.370
mm
Network Hacking
Case Study: Sweat the Small Stuff! .374
? 9 Dial-Up, PBX, Voicemail, and VPN Hacking .377
Wardialing.^80
Hardware .ggg
Legal Issues .001
Peripheral Costs.,0-
Contents
Software.382
A Final Note.403
PBX Hacking.405
Virtual Private Network (VPN) Hacking.415
Summary.419
? 10 Network Devices .421
Discovery .422
Detection.422
SNMP .429
Back Doors.433
Default Accounts.433
Lower the Gates (Vulnerabilities).437
Shared Versus Switched .443
Detecting the Media You're On.444
Passwords on a Silver Platter: Dsniff.445
Sniffing on a Network Switch.448
snmpsniff .452
Summary.457
? 11 Firewalls .459
Firewall Landscape.460
Firewall Identification .460
Advanced Firewall Discovery.465
Scanning Through Firewalls.469
Packet Filtering .473
Application Proxy Vulnerabilities.477
WinGate Vulnerabilities.479
Summary.481
? 12 Denial of Service (DoS) Attacks .483
Motivation of DoS Attackers.484
Types of DoS Attacks.485
Bandwidth Consumption .485
Resource Starvation .486
Programming Flaws .486
Routing and DNS Attacks.487
Generic DoS Attacks .488
Sites Under Attack .491
UNIX and Windows NT DoS .494
Remote DoS Attacks .495
Distributed Denial of Service Attacks .499
Local DoS Attacks .504
Summary.506
XiV Hacking Exposed: Network Security Secrets and Solutions
Software Hacking
Case Study: Using All the Dirty Tricks to Get In .508
? 13 Remote Control Insecurities .511
Discovering Remote Control Software.512
Connecting.513
Weaknesses .514
Revealed Passwords .516
Uploading Profiles .517
What Software Package Is the Best in Terms of Security? .521
pcAnywhere.521
ReachOut .521
Remotely Anywhere.521
Remotely Possible/ControlIT.523
Timbuktu .523
Virtual Network Computing (VNC) .523
Citrix.526
Summary.527
? 14 Advanced Techniques .529
Session Hijacking.530
Back Doors.533
Trojans .555
Subverting the System Environment: Rootkits and
Imaging Tools .558
Social Engineering .561
Summary.563
? 15 Web Hacking .565
Web Pilfering .566
Finding Weil-Known Vulnerabilities.570
Automated Scripts, for All Those "Script Kiddies".570
Automated Applications.572
Script Inadequacies: Input Validation Attacks.573
Active Server Pages (ASP) Vulnerabilities.582
Buffer Overflows .con
Poor Web Design . .KQQ
c 0 .jVo
.600
Contents
T 16 Hacking the Internet User.601
Malicious Mobile Code.603
Microsoft ActiveX .603
Java Security Holes.614
Beware the Cookie Monster.618
Internet Explorer HTML Frame Vulnerabilities.621
SSL Fraud .623
Email Hacking.626
Mail Hacking 101.626
Executing Arbitrary Code Through Email.629
Outlook Address Book Worms .637
File Attachment Attacks.639
IRC Hacking.647
Napster Hacking with Wrapster .649
Global Countermeasures to Internet User Hacking.650
Keep Antivirus Signatures Updated .650
Guarding the Gateways .651
Summary.652
Appendixes
TA Ports .657
TB Top 14 Security Vulnerabilities .661
? C About the Companion Web Site .663
Novell .664
UNIX.665
Windows NT .665
Wordlists and Dictionaries.666
Wardialing.666
Enumeration Scripts .666
T Index .667 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Scambray, Joel McClure, Stuart Kurtz, George |
author_GND | (DE-588)121792064 |
author_facet | Scambray, Joel McClure, Stuart Kurtz, George |
author_role | aut aut aut |
author_sort | Scambray, Joel |
author_variant | j s js s m sm g k gk |
building | Verbundindex |
bvnumber | BV021613594 |
classification_rvk | ST 200 |
classification_tum | DAT 050f DAT 460f DAT 250f |
ctrlnum | (OCoLC)247886115 (DE-599)BVBBV021613594 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02738nam a2200661 c 4500</leader><controlfield tag="001">BV021613594</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20060620 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">060609s2001 ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0072127481</subfield><subfield code="9">0-07-212748-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)247886115</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV021613594</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 250f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Scambray, Joel</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacking exposed</subfield><subfield code="b">network security secrets & solutions</subfield><subfield code="c">Joel Scambray ; Stuart McClure ; George Kurtz</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berkeley [u.a.]</subfield><subfield code="b">Osborne/McGraw-Hill</subfield><subfield code="c">2001</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIX, 703 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Frühere und spätere Aufl. u.d.T.: McClure, Stuart: Hacking exposed</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Betriebssystem</subfield><subfield code="0">(DE-588)4006216-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Betriebssystem</subfield><subfield code="0">(DE-588)4006216-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="8">4\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">McClure, Stuart</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)121792064</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kurtz, George</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014828763&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-014828763</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">4\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV021613594 |
illustrated | Illustrated |
index_date | 2024-07-02T14:51:29Z |
indexdate | 2024-07-09T20:39:55Z |
institution | BVB |
isbn | 0072127481 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-014828763 |
oclc_num | 247886115 |
open_access_boolean | |
owner | DE-29T DE-634 |
owner_facet | DE-29T DE-634 |
physical | XXIX, 703 S. Ill., graph. Darst. |
publishDate | 2001 |
publishDateSearch | 2001 |
publishDateSort | 2001 |
publisher | Osborne/McGraw-Hill |
record_format | marc |
spelling | Scambray, Joel Verfasser aut Hacking exposed network security secrets & solutions Joel Scambray ; Stuart McClure ; George Kurtz 2. ed. Berkeley [u.a.] Osborne/McGraw-Hill 2001 XXIX, 703 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Frühere und spätere Aufl. u.d.T.: McClure, Stuart: Hacking exposed Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Betriebssystem (DE-588)4006216-8 gnd rswk-swf Hacker (DE-588)4113821-1 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s DE-604 Betriebssystem (DE-588)4006216-8 s Hacker (DE-588)4113821-1 s 1\p DE-604 Internet (DE-588)4308416-3 s 2\p DE-604 Datensicherung (DE-588)4011144-1 s 3\p DE-604 Zugriffskontrolle (DE-588)4293034-0 s 4\p DE-604 McClure, Stuart Verfasser (DE-588)121792064 aut Kurtz, George Verfasser aut HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014828763&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 4\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Scambray, Joel McClure, Stuart Kurtz, George Hacking exposed network security secrets & solutions Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd Betriebssystem (DE-588)4006216-8 gnd Hacker (DE-588)4113821-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Datensicherung (DE-588)4011144-1 gnd Internet (DE-588)4308416-3 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4070085-9 (DE-588)4006216-8 (DE-588)4113821-1 (DE-588)4293034-0 (DE-588)4011144-1 (DE-588)4308416-3 |
title | Hacking exposed network security secrets & solutions |
title_auth | Hacking exposed network security secrets & solutions |
title_exact_search | Hacking exposed network security secrets & solutions |
title_exact_search_txtP | Hacking exposed network security secrets & solutions |
title_full | Hacking exposed network security secrets & solutions Joel Scambray ; Stuart McClure ; George Kurtz |
title_fullStr | Hacking exposed network security secrets & solutions Joel Scambray ; Stuart McClure ; George Kurtz |
title_full_unstemmed | Hacking exposed network security secrets & solutions Joel Scambray ; Stuart McClure ; George Kurtz |
title_short | Hacking exposed |
title_sort | hacking exposed network security secrets solutions |
title_sub | network security secrets & solutions |
topic | Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd Betriebssystem (DE-588)4006216-8 gnd Hacker (DE-588)4113821-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Datensicherung (DE-588)4011144-1 gnd Internet (DE-588)4308416-3 gnd |
topic_facet | Computersicherheit Rechnernetz Betriebssystem Hacker Zugriffskontrolle Datensicherung Internet |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014828763&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT scambrayjoel hackingexposednetworksecuritysecretssolutions AT mcclurestuart hackingexposednetworksecuritysecretssolutions AT kurtzgeorge hackingexposednetworksecuritysecretssolutions |