MARC보기
LDR05589cmm u2200685Ki 4500
001000000317138
003OCoLC
00520230525181939
006m d
007cr cnu|||unuuu
008180825s2020 mau ob 001 0 eng d
019 ▼a 1048896051 ▼a 1049600457 ▼a 1049908864 ▼a 1051125843
020 ▼a 9781284147810 ▼q (electronic bk.)
020 ▼a 1284147819 ▼q (electronic bk.)
020 ▼z 1284147800
020 ▼z 9781284147803
035 ▼a 1874525 ▼b (N$T)
035 ▼a (OCoLC)1049912743 ▼z (OCoLC)1048896051 ▼z (OCoLC)1049600457 ▼z (OCoLC)1049908864 ▼z (OCoLC)1051125843
040 ▼a EBLCP ▼b eng ▼c EBLCP ▼d YDX ▼d N$T ▼d 248032
049 ▼a MAIN
050 4 ▼a TK5105.59
072 7 ▼a COM ▼x 060040 ▼2 bisacsh
072 7 ▼a COM ▼x 043050 ▼2 bisacsh
072 7 ▼a COM ▼x 053000 ▼2 bisacsh
08204 ▼a 005.8 ▼2 23
1001 ▼a Oriyano, Sean-Philip.
24510 ▼a Hacker techniques, tools, and incident handling ▼h [electronic resource] / ▼c Sean-Philip Oriyano, Michael G. Solomon.
250 ▼a Third edition.
260 ▼a Burlington, MA : ▼b Jones & Bartlett Learning, ▼c [2020]
300 ▼a 1 online resource (886 p.)
336 ▼a text ▼b txt ▼2 rdacontent
337 ▼a computer ▼b c ▼2 rdamedia
338 ▼a online resource ▼b cr ▼2 rdacarrier
4901 ▼a Information systems security & assurance series
500 ▼a Controlling Access
504 ▼a Includes bibliographical references and index.
5050 ▼a Cover; Title Page; Copyright Page; Contents; Preface; Acknowledgments; About the Authors; CHAPTER 1 Hacking: The Next Generation; Profiles and Motives of Different Types of Hackers; Controls; The Hacker Mindset; Motivation; A Look at the History of Computer Hacking; Ethical Hacking and Penetration Testing; The Role of Ethical Hacking; Ethical Hackers and the C-I-A Triad; Common Hacking Methodologies; Performing a Penetration Test; The Role of the Law and Ethical Standards; CHAPTER 2 TCP/IP Review; Exploring the OSI Reference Model; The Role of Protocols; Layer 1: Physical Layer
5058 ▼a Layer 2: Data Link LayerLayer 3: Network Layer; Layer 4: Transport Layer; Layer 5: Session Layer; Layer 6: Presentation Layer; Layer 7: Application Layer; Mapping the OSI Model to Functions and Protocols; TCP/IP: A Layer-by-Layer Review; Physical or Network Access Layer; Network or Internet Layer; Host-to-Host Layer; Application Layer; CHAPTER 3 Cryptographic Concepts; Cryptographic Basics; Authentication; Integrity; Nonrepudiation; Symmetric and Asymmetric Cryptography; Cryptographic History; What Is an Algorithm or Cipher?; Symmetric Encryption; Asymmetric Encryption; Digital Signatures
5058 ▼a Purpose of Public Key InfrastructureThe Role of Certificate Authorities (CAs); PKI Attacks; Hashing; Common Cryptographic Systems; Cryptanalysis; Future Forms of Cryptography; CHAPTER 4 Physical Security; Basic Equipment Controls; Hard Drive and Mobile Device Encryption; Fax Machines and Printers; Voice over IP (VoIP); Physical Area Controls; Fences; Perimeter Intrusion Detection and Assessment System (PIDAS); Gates; Bollards; Facility Controls; Doors, Mantraps, and Turnstiles; Walls, Ceilings, and Floors; Windows; Guards and Dogs; Construction; Personal Safety Controls; Lighting
5058 ▼a Alarms and Intrusion DetectionClosed-Circuit TV (CCTV)/Remote Monitoring; Physical Access Controls; Locks; Lock Picking; Tokens and Biometrics; Avoiding Common Threats to Physical Security; Natural, Human, and Technical Threats; Physical Keystroke Loggers and Sniffers; Wireless Interception and Rogue Access Points; Defense in Depth; CHAPTER 5 Footprinting Tools and Techniques; The Information-Gathering Process; The Information on a Company Website; Discovering Financial Information; Google Hacking; Exploring Domain Information Leakage; Manual Registrar Query; Automatic Registrar Query; Whois
5058 ▼a NslookupInternet Assigned Numbers Authority (IANA); Determining a Network Range; Tracking an Organization's Employees; Exploiting Insecure Applications; Using Social Networks; Using Basic Countermeasures; CHAPTER 6 Port Scanning; Determining the Network Range; Identifying Active Machines; Wardialing; Wardriving and Related Activities; Pinging; Port Scanning; Mapping Open Ports; Nmap; SuperScan; Scanrand; THC-Amap; OS Fingerprinting; Active OS Fingerprinting; Passive OS Fingerprinting; Mapping the Network; Analyzing the Results; CHAPTER 7 Enumeration and Computer System Hacking; Windows Basics
5880 ▼a Description based upon print version of record.
590 ▼a Master record variable field(s) change: 050, 072, 082, 650
650 0 ▼a Computer security.
650 0 ▼a Penetration testing (Computer security)
650 0 ▼a Computer networks ▼x Security measures.
650 0 ▼a Hackers.
650 7 ▼a COMPUTERS / Internet / Security ▼2 bisacsh
650 7 ▼a COMPUTERS / Networking / Security ▼2 bisacsh
650 7 ▼a COMPUTERS / Security / General ▼2 bisacsh
655 0 ▼a Electronic books.
655 4 ▼a Electronic books.
7001 ▼a Solomon, Michael ▼q (Michael G.), ▼d 1963-
77608 ▼i Print version: ▼a Oriyano, Sean-Philip ▼t Hacker Techniques, Tools, and Incident Handling ▼d Burlington : Jones & Bartlett Learning, LLC,c2018 ▼z 9781284147803
830 0 ▼a Jones & Bartlett Learning information systems security & assurance series.
85640 ▼3 EBSCOhost ▼u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1874525
938 ▼a EBL - Ebook Library ▼b EBLB ▼n EBL5494560
938 ▼a YBP Library Services ▼b YANK ▼n 15659391
938 ▼a EBSCOhost ▼b EBSC ▼n 1874525
990 ▼a 관리자
994 ▼a 92 ▼b N$T