HOME > 상세정보

상세정보

Hack attacks testing: how to conduct your own security audit

Hack attacks testing: how to conduct your own security audit

자료유형
단행본
개인저자
Chirillo, John , 1970-.
서명 / 저자사항
Hack attacks testing: how to conduct your own security audit / John Chirillo.
발행사항
Indianapolis, Ind. :   Wiley ,   c2003.  
형태사항
xvi, 540 p. : ill. ; 24 cm. + 1 CD-ROM (4 3/4 in.).
ISBN
0471229466 (Paper/CD-ROM : alk. paper)
일반주기
Includes index.  
내용주기
Acknowledgments -- Introduction -- Pt. 1 Building a Multisystem Tiger Box -- Ch. 1 Basic Windows 2000/Windows 2000 Server Installation and Configuration -- Ch. 2 Basic Linux and Solaris Installations and Configurations -- Ch. 3 Mac OS X Tiger Box Solutions -- Ch. 4 Installing and Configuring a Testing Target -- Pt. 2 Using Security Analysis Tools for Your Windows-Based Tiger Box Operating System -- Ch. 5 Cerberus Internet Scanner -- Ch. 6 CyberCop Scanner -- Ch. 7 Internet Scanner -- Ch. 8 Security Threat Avoidance Technology Scanner -- Ch. 9 TigerSuite 4.0 -- Pt. 3 Using Security Analysis Tools for *NIX and Mac OS X -- Ch. 10 hping/2 -- Ch. 11 Nessus Security Scanner -- Ch. 12 Nmap -- Ch. 13 SAINT -- Ch. 14 SARA -- Pt. 4 Vulnerability Assessment -- Ch. 15 Comparative Analysis -- App. A Linux/Unix Shortcuts and Commands -- App. B: What's on the CD-ROM -- Index.
일반주제명
Computer security. Computer hackers.
000 02208camuu2200277 a 4500
001 000045150760
005 20050214155717
008 021022s2003 inua 001 0 eng d
010 ▼a 2002152542
020 ▼a 0471229466 (Paper/CD-ROM : alk. paper)
035 ▼a KRIC09032752
040 ▼a DLC ▼c DLC ▼d C#P ▼d HYUA ▼d 241050 ▼d 211009
042 ▼a pcc
050 0 0 ▼a QA76.9.A25 ▼b C49 2003
082 0 0 ▼a 005.8 ▼2 21
090 ▼a 005.8 ▼b C541hk
100 1 ▼a Chirillo, John , ▼d 1970-.
245 1 0 ▼a Hack attacks testing: ▼b how to conduct your own security audit / ▼c John Chirillo.
260 ▼a Indianapolis, Ind. : ▼b Wiley , ▼c c2003.
300 ▼a xvi, 540 p. : ▼b ill. ; ▼c 24 cm. + ▼e 1 CD-ROM (4 3/4 in.).
500 ▼a Includes index.
505 0 ▼a Acknowledgments -- Introduction -- Pt. 1 Building a Multisystem Tiger Box -- Ch. 1 Basic Windows 2000/Windows 2000 Server Installation and Configuration -- Ch. 2 Basic Linux and Solaris Installations and Configurations -- Ch. 3 Mac OS X Tiger Box Solutions -- Ch. 4 Installing and Configuring a Testing Target -- Pt. 2 Using Security Analysis Tools for Your Windows-Based Tiger Box Operating System -- Ch. 5 Cerberus Internet Scanner -- Ch. 6 CyberCop Scanner -- Ch. 7 Internet Scanner -- Ch. 8 Security Threat Avoidance Technology Scanner -- Ch. 9 TigerSuite 4.0 -- Pt. 3 Using Security Analysis Tools for *NIX and Mac OS X -- Ch. 10 hping/2 -- Ch. 11 Nessus Security Scanner -- Ch. 12 Nmap -- Ch. 13 SAINT -- Ch. 14 SARA -- Pt. 4 Vulnerability Assessment -- Ch. 15 Comparative Analysis -- App. A Linux/Unix Shortcuts and Commands -- App. B: What's on the CD-ROM -- Index.
538 ▼a System requirements: Windows: Windows 9x, Windows 2000, Windows NT4 (with SP4 or later), Windows Me, or Windows XP; PC with a 120 MHz Pentium processor or faster; 32 MB RAM (64 MB recommended); ethernet network interface card (NIC) or modem of 28,800 bps or faster. *NIX: PC with a 90 MHz Pentium processor or faster; 32 MB RAM (64 MB recommended); ethernet network interface card (NIC) or modem of 28,800 bps or faster. Macintosh: Mac OS computer running OS X.
650 0 ▼a Computer security.
650 0 ▼a Computer hackers.

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 C541hk 등록번호 121104894 도서상태 대출가능 반납예정일 예약 서비스 B M

관련분야 신착자료

Harvard Business Review (2025)