Network security assessment: [know your network]
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Beijing ; Köln [u.a.]
O'Reilly
2008
|
Ausgabe: | 2. ed. |
Schlagworte: | |
Online-Zugang: | Cover Inhaltsverzeichnis |
Beschreibung: | Includes index. - Previous ed.: 2004 |
Beschreibung: | XXIV, 478 S. Ill., graph. Darst. |
ISBN: | 0596510306 9780596510305 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV023347732 | ||
003 | DE-604 | ||
005 | 20090422 | ||
007 | t | ||
008 | 080617s2008 ad|| |||| 00||| eng d | ||
020 | |a 0596510306 |c (pbk) : £28.50 |9 0-596-51030-6 | ||
020 | |a 9780596510305 |9 978-0-596-51030-5 | ||
024 | 3 | |a 9780596510305 | |
035 | |a (OCoLC)255548500 | ||
035 | |a (DE-599)BSZ273493698 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-1051 |a DE-573 |a DE-522 | ||
082 | 0 | |a 005.8 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
100 | 1 | |a McNab, Chris |d 1980- |e Verfasser |0 (DE-588)131828967 |4 aut | |
245 | 1 | 0 | |a Network security assessment |b [know your network] |c Chris McNab |
250 | |a 2. ed. | ||
264 | 1 | |a Beijing ; Köln [u.a.] |b O'Reilly |c 2008 | |
300 | |a XXIV, 478 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes index. - Previous ed.: 2004 | ||
650 | 4 | |a Computer networks / Security measures | |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Leistungsbewertung |0 (DE-588)4167271-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Betriebssystem |0 (DE-588)4006216-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Server |0 (DE-588)4209324-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)4398750-3 |a Checkliste |2 gnd-content | |
689 | 0 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 1 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 2 | |a Leistungsbewertung |0 (DE-588)4167271-9 |D s |
689 | 0 | 3 | |a Server |0 (DE-588)4209324-7 |D s |
689 | 0 | 4 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 5 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | |8 2\p |5 DE-604 | |
689 | 1 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 1 | 1 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |D s |
689 | 1 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | 4 | |a Leistungsbewertung |0 (DE-588)4167271-9 |D s |
689 | 1 | |8 3\p |5 DE-604 | |
689 | 2 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 2 | 1 | |a Betriebssystem |0 (DE-588)4006216-8 |D s |
689 | 2 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 2 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 2 | 4 | |a Leistungsbewertung |0 (DE-588)4167271-9 |D s |
689 | 2 | |8 4\p |5 DE-604 | |
856 | 4 | |q text/html |u http://swbplus.bsz-bw.de/bsz273493698cov.htm |3 Cover | |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016531390&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-016531390 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 4\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804137703845920768 |
---|---|
adam_text | SECOND EDITION NETWORK SECURITY ASSESSMENT CHRIS MCNAB O REILLY 8
BEIJING * CAMBRIDGE * FARNHAM * KOELN * PARIS * SEBASTOPOL * TAIPEI *
TOKYO TABLE OF CONTENTS FOREWORD XI PREFACE XV 1. NETWORK SECURITY
ASSESSMENT 1 THE BUSINESS BENEFITS 1 IP: THE FOUNDATION OF THE INTERNET
2 CLASSIFYING INTERNET-BASED ATTACKERS 2 ASSESSMENT SERVICE DEFINITIONS
3 NETWORK SECURITY ASSESSMENT METHODOLOGY 4 THE CYCLIC ASSESSMENT
APPROACH 8 2. NETWORK SECURITY ASSESSMENT PLATFORM 10 VIRTUALIZATION
SOFTWARE 10 OPERATING SYSTEMS 11 RECONNAISSANCE TOOLS 13 NETWORK
SCANNING TOOLS 13 EXPLOITATION FRAMEWORKS 14 WEB APPLICATION TESTING
TOOLS 16 3. INTERNET HOST AND NETWORK ENUMERATION 17 QUERYING WEB AND
NEWSGROUP SEARCH ENGINES 18 QUERYING DOMAIN WHOIS REGISTRARS 20 QUERYING
IP WHOIS REGISTRARS 23 BGP QUERYING 28 DNS QUERYING 30 WEB SERVER
CRAWLING 37 AUTOMATING ENUMERATION 37 V SMTP PROBING 38 ENUMERATION
TECHNIQUE RECAP 39 ENUMERATION COUNTERMEASURES 40 4. IP NETWORK SCANNING
42 ICMP PROBING 42 TCP PORT SCANNING 49 UDP PORT SCANNING 60 IDS EVASION
AND FILTER CIRCUMVENTION 62 LOW-LEVEL IP ASSESSMENT 71 NETWORK SCANNING
RECAP 76 NETWORK SCANNING COUNTERMEASURES 77 5. ASSESSING REMOTE
INFORMATION SERVICES 79 REMOTE INFORMATION SERVICES 79 DNS 80 FINGER 86
AUTH 88 NTP 89 SNMP 91 LDAP 95 RWHO 98 RPC RUSERS 98 REMOTE INFORMATION
SERVICES COUNTERMEASURES 99 6. ASSESSING WEB SERVERS 101 WEB SERVERS 101
FINGERPRINTING ACCESSIBLE WEB SERVERS 102 IDENTIFYING AND ASSESSING
REVERSE PROXY MECHANISMS 107 ENUMERATING VIRTUAL HOSTS AND WEB SITES 113
IDENTIFYING SUBSYSTEMS AND ENABLED COMPONENTS 114 INVESTIGATING KNOWN
VULNERABILITIES 132 BASIC WEB SERVER CRAWLING 155 WEB SERVERS
COUNTERMEASURES 158 7. ASSESSING WEB APPLICATIONS 160 WEB APPLICATION
TECHNOLOGIES OVERVIEW 160 WEB APPLICATION PROFILING 161 WEB APPLICATION
ATTACK STRATEGIES 170 VI | TABLE OF CONTENTS WEB APPLICATION
VULNERABILITIES 180 WEB SECURITY CHECKLIST 196 8. ASSESSING REMOTE
MAINTENANCE SERVICES 198 REMOTE MAINTENANCE SERVICES 198 FTP 199 SSH 212
TELNET 215 R-SERVICES 220 X WINDOWS 224 CITRIX 229 MICROSOFT REMOTE
DESKTOP PROTOCOL 232 VNC 234 REMOTE MAINTENANCE SERVICES COUNTERMEASURES
237 9. ASSESSING DATABASE SERVICES 239 MICROSOFT SQL SERVER 239 ORACLE
244 MYSQL 252 DATABASE SERVICES COUNTERMEASURES 255 10. ASSESSING
WINDOWS NETWORKING SERVICES 256 MICROSOFT WINDOWS NETWORKING SERVICES
256 MICROSOFT RPC SERVICES 257 THE NETBIOS NAME SERVICE 273 THE NETBIOS
DATAGRAM SERVICE 275 THE NETBIOS SESSION SERVICE 276 THE CIFS SERVICE
285 UNIX SAMBA VULNERABILITIES 287 WINDOWS NETWORKING SERVICES
COUNTERMEASURES 288 11. ASSESSING EMAIL SERVICES 290 EMAIL SERVICE
PROTOCOLS 290 SMTP 290 POP-2 AND POP-3 302 IMAP 303 EMAIL SERVICES
COUNTERMEASURES 305 TABLE OF CONTENTS | VII 12. ASSESSING IP VPN
SERVICES 307 IPSEC VPNS 307 ATTACKING IPSEC VPNS 311 MICROSOFT PPTP 320
SSL VPNS 321 VPN SERVICES COUNTERMEASURES 329 13. ASSESSING UNIX RPC
SERVICES 330 ENUMERATING UNIX RPC SERVICES 330 RPC SERVICE
VULNERABILITIES 332 UNIX RPC SERVICES COUNTERMEASURES 339 14.
APPLICATION-LEVEL RISKS 340 THE FUNDAMENTAL HACKING CONCEPT 340 WHY
SOFTWARE IS VULNERABLE 341 NETWORK SERVICE VULNERABILITIES AND ATTACKS
342 CLASSIC BUFFER-OVERFLOW VULNERABILITIES 346 HEAP OVERFLOWS 356
INTEGER OVERFLOWS 364 FORMAT STRING BUGS 367 MEMORY MANIPULATION ATTACKS
RECAP 373 MITIGATING PROCESS MANIPULATION RISKS 374 RECOMMENDED SECURE
DEVELOPMENT READING 376 15. RUNNING NESSUS 377 NESSUS ARCHITECTURE 377
DEPLOYMENT OPTIONS AND PREREQUISITES 378 NESSUS INSTALLATION 379
CONFIGURING NESSUS 383 RUNNING NESSUS 389 NESSUS REPORTING 390 RUNNING
NESSUS RECAP 392 16. EXPLOITATION FRAMEWORKS 393 METASPLOIT FRAMEWORK
393 CORE IMPACT 400 IMMUNITY CANVAS 408 EXPLOITATION FRAMEWORKS RECAP
414 VIII | TABLE OF CONTENTS A. TCP, UDP PORTS, AND ICMP MESSAGE TYPES
415 B. SOURCES OF VULNERABILITY INFORMATION 420 * EXPLOIT FRAMEWORK
MODULES 422 INDEX 453 TABLE OF CONTENTS | IX
|
adam_txt |
SECOND EDITION NETWORK SECURITY ASSESSMENT CHRIS MCNAB O'REILLY 8
BEIJING * CAMBRIDGE * FARNHAM * KOELN * PARIS * SEBASTOPOL * TAIPEI *
TOKYO TABLE OF CONTENTS FOREWORD XI PREFACE XV 1. NETWORK SECURITY
ASSESSMENT 1 THE BUSINESS BENEFITS 1 IP: THE FOUNDATION OF THE INTERNET
2 CLASSIFYING INTERNET-BASED ATTACKERS 2 ASSESSMENT SERVICE DEFINITIONS
3 NETWORK SECURITY ASSESSMENT METHODOLOGY 4 THE CYCLIC ASSESSMENT
APPROACH 8 2. NETWORK SECURITY ASSESSMENT PLATFORM 10 VIRTUALIZATION
SOFTWARE 10 OPERATING SYSTEMS 11 RECONNAISSANCE TOOLS 13 NETWORK
SCANNING TOOLS 13 EXPLOITATION FRAMEWORKS 14 WEB APPLICATION TESTING
TOOLS 16 3. INTERNET HOST AND NETWORK ENUMERATION 17 QUERYING WEB AND
NEWSGROUP SEARCH ENGINES 18 QUERYING DOMAIN WHOIS REGISTRARS 20 QUERYING
IP WHOIS REGISTRARS 23 BGP QUERYING 28 DNS QUERYING 30 WEB SERVER
CRAWLING 37 AUTOMATING ENUMERATION 37 V SMTP PROBING 38 ENUMERATION
TECHNIQUE RECAP 39 ENUMERATION COUNTERMEASURES 40 4. IP NETWORK SCANNING
42 ICMP PROBING 42 TCP PORT SCANNING 49 UDP PORT SCANNING 60 IDS EVASION
AND FILTER CIRCUMVENTION 62 LOW-LEVEL IP ASSESSMENT 71 NETWORK SCANNING
RECAP 76 NETWORK SCANNING COUNTERMEASURES 77 5. ASSESSING REMOTE
INFORMATION SERVICES 79 REMOTE INFORMATION SERVICES 79 DNS 80 FINGER 86
AUTH 88 NTP 89 SNMP 91 LDAP 95 RWHO 98 RPC RUSERS 98 REMOTE INFORMATION
SERVICES COUNTERMEASURES 99 6. ASSESSING WEB SERVERS 101 WEB SERVERS 101
FINGERPRINTING ACCESSIBLE WEB SERVERS 102 IDENTIFYING AND ASSESSING
REVERSE PROXY MECHANISMS 107 ENUMERATING VIRTUAL HOSTS AND WEB SITES 113
IDENTIFYING SUBSYSTEMS AND ENABLED COMPONENTS 114 INVESTIGATING KNOWN
VULNERABILITIES 132 BASIC WEB SERVER CRAWLING 155 WEB SERVERS
COUNTERMEASURES 158 7. ASSESSING WEB APPLICATIONS 160 WEB APPLICATION
TECHNOLOGIES OVERVIEW 160 WEB APPLICATION PROFILING 161 WEB APPLICATION
ATTACK STRATEGIES 170 VI | TABLE OF CONTENTS WEB APPLICATION
VULNERABILITIES 180 WEB SECURITY CHECKLIST 196 8. ASSESSING REMOTE
MAINTENANCE SERVICES 198 REMOTE MAINTENANCE SERVICES 198 FTP 199 SSH 212
TELNET 215 R-SERVICES 220 X WINDOWS 224 CITRIX 229 MICROSOFT REMOTE
DESKTOP PROTOCOL 232 VNC 234 REMOTE MAINTENANCE SERVICES COUNTERMEASURES
237 9. ASSESSING DATABASE SERVICES 239 MICROSOFT SQL SERVER 239 ORACLE
244 MYSQL 252 DATABASE SERVICES COUNTERMEASURES 255 10. ASSESSING
WINDOWS NETWORKING SERVICES 256 MICROSOFT WINDOWS NETWORKING SERVICES
256 MICROSOFT RPC SERVICES 257 THE NETBIOS NAME SERVICE 273 THE NETBIOS
DATAGRAM SERVICE 275 THE NETBIOS SESSION SERVICE 276 THE CIFS SERVICE
285 UNIX SAMBA VULNERABILITIES 287 WINDOWS NETWORKING SERVICES
COUNTERMEASURES 288 11. ASSESSING EMAIL SERVICES 290 EMAIL SERVICE
PROTOCOLS 290 SMTP 290 POP-2 AND POP-3 302 IMAP 303 EMAIL SERVICES
COUNTERMEASURES 305 TABLE OF CONTENTS | VII 12. ASSESSING IP VPN
SERVICES 307 IPSEC VPNS 307 ATTACKING IPSEC VPNS 311 MICROSOFT PPTP 320
SSL VPNS 321 VPN SERVICES COUNTERMEASURES 329 13. ASSESSING UNIX RPC
SERVICES 330 ENUMERATING UNIX RPC SERVICES 330 RPC SERVICE
VULNERABILITIES 332 UNIX RPC SERVICES COUNTERMEASURES 339 14.
APPLICATION-LEVEL RISKS 340 THE FUNDAMENTAL HACKING CONCEPT 340 WHY
SOFTWARE IS VULNERABLE 341 NETWORK SERVICE VULNERABILITIES AND ATTACKS
342 CLASSIC BUFFER-OVERFLOW VULNERABILITIES 346 HEAP OVERFLOWS 356
INTEGER OVERFLOWS 364 FORMAT STRING BUGS 367 MEMORY MANIPULATION ATTACKS
RECAP 373 MITIGATING PROCESS MANIPULATION RISKS 374 RECOMMENDED SECURE
DEVELOPMENT READING 376 15. RUNNING NESSUS 377 NESSUS ARCHITECTURE 377
DEPLOYMENT OPTIONS AND PREREQUISITES 378 NESSUS INSTALLATION 379
CONFIGURING NESSUS 383 RUNNING NESSUS 389 NESSUS REPORTING 390 RUNNING
NESSUS RECAP 392 16. EXPLOITATION FRAMEWORKS 393 METASPLOIT FRAMEWORK
393 CORE IMPACT 400 IMMUNITY CANVAS 408 EXPLOITATION FRAMEWORKS RECAP
414 VIII | TABLE OF CONTENTS A. TCP, UDP PORTS, AND ICMP MESSAGE TYPES
415 B. SOURCES OF VULNERABILITY INFORMATION 420 * EXPLOIT FRAMEWORK
MODULES 422 INDEX 453 TABLE OF CONTENTS | IX |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | McNab, Chris 1980- |
author_GND | (DE-588)131828967 |
author_facet | McNab, Chris 1980- |
author_role | aut |
author_sort | McNab, Chris 1980- |
author_variant | c m cm |
building | Verbundindex |
bvnumber | BV023347732 |
classification_rvk | ST 200 |
ctrlnum | (OCoLC)255548500 (DE-599)BSZ273493698 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03250nam a2200745 c 4500</leader><controlfield tag="001">BV023347732</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20090422 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">080617s2008 ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0596510306</subfield><subfield code="c">(pbk) : £28.50</subfield><subfield code="9">0-596-51030-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780596510305</subfield><subfield code="9">978-0-596-51030-5</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9780596510305</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)255548500</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BSZ273493698</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1051</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-522</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">McNab, Chris</subfield><subfield code="d">1980-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)131828967</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network security assessment</subfield><subfield code="b">[know your network]</subfield><subfield code="c">Chris McNab</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Beijing ; Köln [u.a.]</subfield><subfield code="b">O'Reilly</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIV, 478 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Previous ed.: 2004</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Leistungsbewertung</subfield><subfield code="0">(DE-588)4167271-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Betriebssystem</subfield><subfield code="0">(DE-588)4006216-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Server</subfield><subfield code="0">(DE-588)4209324-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4398750-3</subfield><subfield code="a">Checkliste</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Leistungsbewertung</subfield><subfield code="0">(DE-588)4167271-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Server</subfield><subfield code="0">(DE-588)4209324-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Leistungsbewertung</subfield><subfield code="0">(DE-588)4167271-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Betriebssystem</subfield><subfield code="0">(DE-588)4006216-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="4"><subfield code="a">Leistungsbewertung</subfield><subfield code="0">(DE-588)4167271-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">4\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="q">text/html</subfield><subfield code="u">http://swbplus.bsz-bw.de/bsz273493698cov.htm</subfield><subfield code="3">Cover</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016531390&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016531390</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">4\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4398750-3 Checkliste gnd-content |
genre_facet | Checkliste |
id | DE-604.BV023347732 |
illustrated | Illustrated |
index_date | 2024-07-02T21:04:03Z |
indexdate | 2024-07-09T21:16:31Z |
institution | BVB |
isbn | 0596510306 9780596510305 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016531390 |
oclc_num | 255548500 |
open_access_boolean | |
owner | DE-1051 DE-573 DE-522 |
owner_facet | DE-1051 DE-573 DE-522 |
physical | XXIV, 478 S. Ill., graph. Darst. |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | O'Reilly |
record_format | marc |
spelling | McNab, Chris 1980- Verfasser (DE-588)131828967 aut Network security assessment [know your network] Chris McNab 2. ed. Beijing ; Köln [u.a.] O'Reilly 2008 XXIV, 478 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Includes index. - Previous ed.: 2004 Computer networks / Security measures Rechnernetz (DE-588)4070085-9 gnd rswk-swf Leistungsbewertung (DE-588)4167271-9 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Betriebssystem (DE-588)4006216-8 gnd rswk-swf Server (DE-588)4209324-7 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Kommunikationsprotokoll (DE-588)4128252-8 gnd rswk-swf 1\p (DE-588)4398750-3 Checkliste gnd-content Datensicherung (DE-588)4011144-1 s Rechnernetz (DE-588)4070085-9 s Leistungsbewertung (DE-588)4167271-9 s Server (DE-588)4209324-7 s Computersicherheit (DE-588)4274324-2 s Internet (DE-588)4308416-3 s 2\p DE-604 Kommunikationsprotokoll (DE-588)4128252-8 s 3\p DE-604 Betriebssystem (DE-588)4006216-8 s 4\p DE-604 text/html http://swbplus.bsz-bw.de/bsz273493698cov.htm Cover GBV Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016531390&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 4\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | McNab, Chris 1980- Network security assessment [know your network] Computer networks / Security measures Rechnernetz (DE-588)4070085-9 gnd Leistungsbewertung (DE-588)4167271-9 gnd Datensicherung (DE-588)4011144-1 gnd Betriebssystem (DE-588)4006216-8 gnd Server (DE-588)4209324-7 gnd Computersicherheit (DE-588)4274324-2 gnd Internet (DE-588)4308416-3 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd |
subject_GND | (DE-588)4070085-9 (DE-588)4167271-9 (DE-588)4011144-1 (DE-588)4006216-8 (DE-588)4209324-7 (DE-588)4274324-2 (DE-588)4308416-3 (DE-588)4128252-8 (DE-588)4398750-3 |
title | Network security assessment [know your network] |
title_auth | Network security assessment [know your network] |
title_exact_search | Network security assessment [know your network] |
title_exact_search_txtP | Network security assessment [know your network] |
title_full | Network security assessment [know your network] Chris McNab |
title_fullStr | Network security assessment [know your network] Chris McNab |
title_full_unstemmed | Network security assessment [know your network] Chris McNab |
title_short | Network security assessment |
title_sort | network security assessment know your network |
title_sub | [know your network] |
topic | Computer networks / Security measures Rechnernetz (DE-588)4070085-9 gnd Leistungsbewertung (DE-588)4167271-9 gnd Datensicherung (DE-588)4011144-1 gnd Betriebssystem (DE-588)4006216-8 gnd Server (DE-588)4209324-7 gnd Computersicherheit (DE-588)4274324-2 gnd Internet (DE-588)4308416-3 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd |
topic_facet | Computer networks / Security measures Rechnernetz Leistungsbewertung Datensicherung Betriebssystem Server Computersicherheit Internet Kommunikationsprotokoll Checkliste |
url | http://swbplus.bsz-bw.de/bsz273493698cov.htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016531390&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT mcnabchris networksecurityassessmentknowyournetwork |