LDR | | 05589cmm u2200685Ki 4500 |
001 | | 000000317138 |
003 | | OCoLC |
005 | | 20230525181939 |
006 | | m d |
007 | | cr cnu|||unuuu |
008 | | 180825s2020 mau ob 001 0 eng d |
019 | |
▼a 1048896051
▼a 1049600457
▼a 1049908864
▼a 1051125843 |
020 | |
▼a 9781284147810
▼q (electronic bk.) |
020 | |
▼a 1284147819
▼q (electronic bk.) |
020 | |
▼z 1284147800 |
020 | |
▼z 9781284147803 |
035 | |
▼a 1874525
▼b (N$T) |
035 | |
▼a (OCoLC)1049912743
▼z (OCoLC)1048896051
▼z (OCoLC)1049600457
▼z (OCoLC)1049908864
▼z (OCoLC)1051125843 |
040 | |
▼a EBLCP
▼b eng
▼c EBLCP
▼d YDX
▼d N$T
▼d 248032 |
049 | |
▼a MAIN |
050 | 4 |
▼a TK5105.59 |
072 | 7 |
▼a COM
▼x 060040
▼2 bisacsh |
072 | 7 |
▼a COM
▼x 043050
▼2 bisacsh |
072 | 7 |
▼a COM
▼x 053000
▼2 bisacsh |
082 | 04 |
▼a 005.8
▼2 23 |
100 | 1 |
▼a Oriyano, Sean-Philip. |
245 | 10 |
▼a Hacker techniques, tools, and incident handling
▼h [electronic resource] /
▼c Sean-Philip Oriyano, Michael G. Solomon. |
250 | |
▼a Third edition. |
260 | |
▼a Burlington, MA :
▼b Jones & Bartlett Learning,
▼c [2020] |
300 | |
▼a 1 online resource (886 p.) |
336 | |
▼a text
▼b txt
▼2 rdacontent |
337 | |
▼a computer
▼b c
▼2 rdamedia |
338 | |
▼a online resource
▼b cr
▼2 rdacarrier |
490 | 1 |
▼a Information systems security & assurance series |
500 | |
▼a Controlling Access |
504 | |
▼a Includes bibliographical references and index. |
505 | 0 |
▼a Cover; Title Page; Copyright Page; Contents; Preface; Acknowledgments; About the Authors; CHAPTER 1 Hacking: The Next Generation; Profiles and Motives of Different Types of Hackers; Controls; The Hacker Mindset; Motivation; A Look at the History of Computer Hacking; Ethical Hacking and Penetration Testing; The Role of Ethical Hacking; Ethical Hackers and the C-I-A Triad; Common Hacking Methodologies; Performing a Penetration Test; The Role of the Law and Ethical Standards; CHAPTER 2 TCP/IP Review; Exploring the OSI Reference Model; The Role of Protocols; Layer 1: Physical Layer |
505 | 8 |
▼a Layer 2: Data Link LayerLayer 3: Network Layer; Layer 4: Transport Layer; Layer 5: Session Layer; Layer 6: Presentation Layer; Layer 7: Application Layer; Mapping the OSI Model to Functions and Protocols; TCP/IP: A Layer-by-Layer Review; Physical or Network Access Layer; Network or Internet Layer; Host-to-Host Layer; Application Layer; CHAPTER 3 Cryptographic Concepts; Cryptographic Basics; Authentication; Integrity; Nonrepudiation; Symmetric and Asymmetric Cryptography; Cryptographic History; What Is an Algorithm or Cipher?; Symmetric Encryption; Asymmetric Encryption; Digital Signatures |
505 | 8 |
▼a Purpose of Public Key InfrastructureThe Role of Certificate Authorities (CAs); PKI Attacks; Hashing; Common Cryptographic Systems; Cryptanalysis; Future Forms of Cryptography; CHAPTER 4 Physical Security; Basic Equipment Controls; Hard Drive and Mobile Device Encryption; Fax Machines and Printers; Voice over IP (VoIP); Physical Area Controls; Fences; Perimeter Intrusion Detection and Assessment System (PIDAS); Gates; Bollards; Facility Controls; Doors, Mantraps, and Turnstiles; Walls, Ceilings, and Floors; Windows; Guards and Dogs; Construction; Personal Safety Controls; Lighting |
505 | 8 |
▼a Alarms and Intrusion DetectionClosed-Circuit TV (CCTV)/Remote Monitoring; Physical Access Controls; Locks; Lock Picking; Tokens and Biometrics; Avoiding Common Threats to Physical Security; Natural, Human, and Technical Threats; Physical Keystroke Loggers and Sniffers; Wireless Interception and Rogue Access Points; Defense in Depth; CHAPTER 5 Footprinting Tools and Techniques; The Information-Gathering Process; The Information on a Company Website; Discovering Financial Information; Google Hacking; Exploring Domain Information Leakage; Manual Registrar Query; Automatic Registrar Query; Whois |
505 | 8 |
▼a NslookupInternet Assigned Numbers Authority (IANA); Determining a Network Range; Tracking an Organization's Employees; Exploiting Insecure Applications; Using Social Networks; Using Basic Countermeasures; CHAPTER 6 Port Scanning; Determining the Network Range; Identifying Active Machines; Wardialing; Wardriving and Related Activities; Pinging; Port Scanning; Mapping Open Ports; Nmap; SuperScan; Scanrand; THC-Amap; OS Fingerprinting; Active OS Fingerprinting; Passive OS Fingerprinting; Mapping the Network; Analyzing the Results; CHAPTER 7 Enumeration and Computer System Hacking; Windows Basics |
588 | 0 |
▼a Description based upon print version of record. |
590 | |
▼a Master record variable field(s) change: 050, 072, 082, 650 |
650 | 0 |
▼a Computer security. |
650 | 0 |
▼a Penetration testing (Computer security) |
650 | 0 |
▼a Computer networks
▼x Security measures. |
650 | 0 |
▼a Hackers. |
650 | 7 |
▼a COMPUTERS / Internet / Security
▼2 bisacsh |
650 | 7 |
▼a COMPUTERS / Networking / Security
▼2 bisacsh |
650 | 7 |
▼a COMPUTERS / Security / General
▼2 bisacsh |
655 | 0 |
▼a Electronic books. |
655 | 4 |
▼a Electronic books. |
700 | 1 |
▼a Solomon, Michael
▼q (Michael G.),
▼d 1963- |
776 | 08 |
▼i Print version:
▼a Oriyano, Sean-Philip
▼t Hacker Techniques, Tools, and Incident Handling
▼d Burlington : Jones & Bartlett Learning, LLC,c2018
▼z 9781284147803 |
830 | 0 |
▼a Jones & Bartlett Learning information systems security & assurance series. |
856 | 40 |
▼3 EBSCOhost
▼u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1874525 |
938 | |
▼a EBL - Ebook Library
▼b EBLB
▼n EBL5494560 |
938 | |
▼a YBP Library Services
▼b YANK
▼n 15659391 |
938 | |
▼a EBSCOhost
▼b EBSC
▼n 1874525 |
990 | |
▼a 관리자 |
994 | |
▼a 92
▼b N$T |